Results

By type

          2022-04-02 03:06:17,689 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-02 03:06:19,466 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-02 03:06:20.608  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 02, 2022 3:06:23 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 02, 2022 3:06:23 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 02, 2022 3:06:23 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 02, 2022 3:06:23 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-02 03:06:24.451 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-02 03:06:24.825  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-02 03:06:25.021  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-02 03:06:26.022 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-02 03:06:26.026 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-04-02 03:06:26.029 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-02 03:06:26.035 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-02 03:06:26.102 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-02 03:06:26.109 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-04-02 03:06:26.280 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-02 03:06:27.174 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 02, 2022 3:06:28 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-02 03:06:28.564  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 12.329 seconds (JVM running for 15.13)
Apr 02, 2022 3:06:45 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-02 03:07:00.577  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 03:07:00.587 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 03:07:00.638 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-02 03:07:00.643 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 03:07:00.663  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-02 03:07:00.665  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 03:07:00.666  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 03:07:00.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 03:07:00.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 03:07:00.672 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 03:07:00.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 03:07:00.684 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 03:07:00.733 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 03:07:00.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 03:07:00.744 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 03:07:00.748 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 03:07:01.483  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 03:07:01.486  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 03:07:01.487 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 03:07:01.488 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 03:07:01.500  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 03:07:01.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 03:07:01.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 03:07:01.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 03:07:01.503 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 03:07:01.517 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 03:07:01.518 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 03:07:01.518 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 03:07:01.527 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 03:07:01.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 03:07:01.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 03:07:01.531 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 03:07:01.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:d4:79:1d:ac:17:49:f6:2c:da:e1:75:44:24:01:ea:f1:b1:84:db]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:10:14.838  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:10:14.845 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:10:14.850 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:10:14.852 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:10:14.852  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:10:14.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:10:14.854  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:10:14.854 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:10:14.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:10:14.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:10:14.872 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:10:14.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:10:14.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:10:14.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:10:15.076  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:10:15.077  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:10:15.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:10:15.078 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:10:15.083  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:10:15.084  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:10:15.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:10:15.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:10:15.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:10:15.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:10:15.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:10:15.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:10:15.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:10:15.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:10:15.090 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:10:15.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:10:15.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: b4b034039b35c83a9c175f7abebbc83386d1471d86fd5c8d5b0e96158cb51306a591cfa5a3d9f7107046c5712ec094619e046afed8cb5d4c79efb18af4732c3dcff7e2e3b65de16eb9049a24964373257a3bf31044dd835b1cd76181dc7af882d68e122ad465f31f37a348a682ada6a82544f71cff4baa74c826ad192288fc3782f5e7b316ee5583720202d4abe4b8599482227d4b8e5c3ef16b08b4a2a5f4efb21540ec286320553fdc4eb16066bffc44caee28805c399f140d1d0505322f1e6aedb34cb14dfd86c0d68d5152609fa49b6cd20b3f85cfa786de9aea4c71bf855b2b1afc84c8b456ef669020ab0ea595025e1554b80df2f87a8e164962c616f247210246cc1ddbafc35dba27d8a474b67f337f57076508e3c7a3ba152ffd822980f1fee97c5dc97f1be82793a69bec3a5b1c3a54a2ba9766447f91ffce79c4509ab2c1a06a4e7dbd5ff346a367e76e86b07b1a0fe3857cc8cb09d16d1db81462a1d828a41753f2a0b854ed483d65408b404683aa9d04b827d58ca58473762771
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:42:6e:b1:23:a6:19:78:0b:3c:b5:80:9e:ad:be:2b:fc:7b:06:4c]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:11:41.896  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:11:41.898 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:11:41.901 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:11:41.902 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:11:41.904  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:11:41.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:11:41.905  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:11:41.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:11:41.907 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:11:41.911 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:11:41.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:11:41.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:11:41.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:11:41.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:11:42.103  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:11:42.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:11:42.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:11:42.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:11:42.109  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:11:42.110  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:11:42.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:11:42.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:11:42.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:11:42.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:11:42.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:11:42.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:11:42.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:11:42.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:11:42.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:11:42.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:11:42.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:c3:9b:87:37:a0:b4:20:90:86:c0:1b:0d:1d:72:7b:85:8b:b7:57]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:13:53.651  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:13:53.654 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:13:53.657 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:13:53.658 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:13:53.659  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:13:53.660  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:13:53.661  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:13:53.662 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:13:53.662 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:13:53.663 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:13:53.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:13:53.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:13:53.673 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:13:53.674 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:13:53.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:13:53.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:13:53.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:13:53.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:13:53.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:13:53.836  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:13:53.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:13:53.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:13:53.839 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:13:53.840 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:13:53.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:13:53.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:13:53.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:13:53.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:13:53.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:13:53.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:13:53.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:50:b9:17:91:cc:69:ed:7d:d8:ec:c1:43:0b:92:dd:05:29:60:5a]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:14:26.752  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:14:26.754 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:14:26.756 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:14:26.758 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:14:26.759  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:14:26.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:14:26.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:14:26.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:14:26.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:14:26.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:14:26.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:14:26.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:14:26.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:14:26.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:14:26.938  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:14:26.939  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:14:26.940 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:14:26.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:14:26.944  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:14:26.945  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:14:26.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:14:26.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:14:26.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:14:26.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:14:26.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:14:26.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:14:26.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:14:26.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:14:26.952 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:14:26.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:14:26.960 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:8a:c7:4c:7a:7b:0d:92:a7:60:6b:04:3b:75:a5:30:5d:02:48:8a]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:15:01.852  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:15:01.854 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:15:01.856 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:15:01.857 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:15:01.858  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:15:01.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:15:01.859  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:15:01.860 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:15:01.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:15:01.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:15:01.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:15:01.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:01.872 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:01.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:02.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:15:02.071  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:15:02.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:15:02.072 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:02.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:15:02.074  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:15:02.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:02.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:02.075 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:02.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:02.076 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:02.077 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:02.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:02.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:02.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:02.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:15:02.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: b4b034039b35c83a9c175f7abebbc83386d1471d86fd5c8d5b0e96158cb51306a591cfa5a3d9f7107046c5712ec094619e046afed8cb5d4c79efb18af4732c3dcff7e2e3b65de16eb9049a24964373257a3bf31044dd835b1cd76181dc7af882d68e122ad465f31f37a348a682ada6a82544f71cff4baa74c826ad192288fc3782f5e7b316ee5583720202d4abe4b8599482227d4b8e5c3ef16b08b4a2a5f4efb21540ec286320553fdc4eb16066bffc44caee28805c399f140d1d0505322f1e6aedb34cb14dfd86c0d68d5152609fa49b6cd20b3f85cfa786de9aea4c71bf855b2b1afc84c8b456ef669020ab0ea595025e1554b80df2f87a8e164962c616f247210246cc1ddbafc35dba27d8a474b67f337f57076508e3c7a3ba152ffd822980f1fee97c5dc97f1be82793a69bec3a5b1c3a54a2ba9766447f91ffce79c4509ab2c1a06a4e7dbd5ff346a367e76e86b07b1a0fe3857cc8cb09d16d1db81462a1d828a41753f2a0b854ed483d65408b404683aa9d04b827d58ca58473762771
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f7:6c:4d:8b:85:d2:e3:07:65:19:90:e9:0b:f6:4f:71:65:6b:10:bc]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:15:25.770  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:15:25.771 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:15:25.773 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-02 04:15:25.773 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:15:25.774  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-02 04:15:25.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:15:25.775  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:15:25.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:15:25.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:15:25.776 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:15:25.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:15:25.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:25.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:25.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:25.931  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:15:25.932  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:15:25.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:15:25.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:25.935  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:15:25.936  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:15:25.936 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:25.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:25.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:25.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:25.938 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:25.939 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:25.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:25.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:25.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:25.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:15:25.946 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:37:b9:75:8b:e1:a8:bb:4f:2f:de:af:13:cc:f1:9f:0e:a8:f4:c7]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:15:34.486  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:15:34.488 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:15:34.490 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:15:34.490 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:15:34.491  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:15:34.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:15:34.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:15:34.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:15:34.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:15:34.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:15:34.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:15:34.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:34.498 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:15:34.499 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:34.618  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:15:34.618  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:15:34.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:15:34.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:15:34.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:15:34.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:15:34.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:34.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:34.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:34.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:34.623 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:34.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:34.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:15:34.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:15:34.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:15:34.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:15:34.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:b2:5c:02:1c:f9:4d:37:4a:c2:34:cb:04:f1:b3:32:c7:30:0c:7e]
            modulus: b2b42128880841cb9c7cdcde8262a7a4124c9af4f8ff0b0fa1a278f9246dc1e13a82c046559f5e9336c6a841fb91211d7e2b7b04140fb848383dcfaa5b94111b1fc69d541a518ff70b914770b4ef74e4c0fe65d4cfbbcc000580b8ce1c856e4e394acbc3194d9dd3d42e2d788f40139bb92d34ba32c5e7becef2681428434aee90e8f06208e2e44e048ed113ee3539986199c401dc3f0eaa6c617899d351cfb9ca2da1d2b1e222b6b5107e5ca70d26427d6dc74aa7b63679e49f5e81b035e7c8037fecdd7338355c22898bc652ef75bced80f349ce4000e799fe48b22c27b63c15cd76ca136ad62e9db0dea30579c7a92c02eb2dd7b3463a4954d3658a08e429
    public exponent: 10001

] 
2022-04-02 04:16:52.481  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:16:52.482 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:16:52.484 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:16:52.485 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:16:52.485  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:16:52.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:16:52.486  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:16:52.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:16:52.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:16:52.487 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:16:52.492 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:16:52.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:16:52.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:16:52.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:16:52.613  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:16:52.613  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:16:52.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:16:52.614 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:16:52.615  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:16:52.616  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:16:52.616 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:16:52.617 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:16:52.617 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:16:52.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:16:52.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:16:52.618 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:16:52.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:16:52.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:16:52.620 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:16:52.621 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:16:52.624 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:3c:ca:42:8b:1f:8d:f3:d9:98:2e:54:f0:de:4e:69:0f:8f:7d:e8]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:17:21.945  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:17:21.947 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:17:21.948 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:17:21.949 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:17:21.949  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:17:21.950  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:17:21.950  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:17:21.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:17:21.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:17:21.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:17:21.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:17:21.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:17:21.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:17:21.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:17:22.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:17:22.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:17:22.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:17:22.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:17:22.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:17:22.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:17:22.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:17:22.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:17:22.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:17:22.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:17:22.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:17:22.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:17:22.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:17:22.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:17:22.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:17:22.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:17:22.084 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e5:3f:92:f6:fb:20:7e:cf:c7:8a:ff:46:46:74:06:16:7b:10:3b:3a]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:18:05.827  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:18:05.830 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:18:05.832 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:18:05.833 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:18:05.836  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:18:05.837  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:18:05.838  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:18:05.853 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:18:05.853 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:18:05.854 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:18:05.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:18:05.876 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:18:05.878 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:18:05.879 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:18:06.018  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:18:06.019  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:18:06.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:18:06.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:18:06.023  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:18:06.024  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:18:06.024 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:18:06.025 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:18:06.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:18:06.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:18:06.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:18:06.029 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:18:06.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:18:06.030 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:18:06.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:18:06.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:18:06.040 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:eb:85:d1:76:49:e8:07:92:b3:5b:9c:f5:9b:a2:15:7c:ab:78:33]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:19:39.995  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:19:39.996 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:19:39.998 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-02 04:19:39.998 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:19:39.999  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-02 04:19:40.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:19:40.000  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:19:40.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:19:40.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:19:40.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:19:40.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:19:40.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:19:40.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:19:40.010 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:19:40.131  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:19:40.132  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:19:40.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:19:40.146 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:19:40.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:19:40.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:19:40.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:19:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:19:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:19:40.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:19:40.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:19:40.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:19:40.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:19:40.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:19:40.151 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:19:40.152 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:19:40.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:95:8a:7f:76:2a:7c:89:b7:f3:ce:45:00:a3:87:36:40:ea:9e:bb]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:29:42.449  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:29:42.454 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:29:42.458 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:29:42.460 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:29:42.461  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:29:42.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:29:42.462  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:29:42.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:29:42.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:29:42.464 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:29:42.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:29:42.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:29:42.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:29:42.476 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:29:42.623  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:29:42.624  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:29:42.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:29:42.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:29:42.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:29:42.627  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:29:42.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:29:42.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:29:42.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:29:42.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:29:42.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:29:42.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:29:42.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:29:42.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:29:42.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:29:42.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:29:42.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [97:90:58:e2:18:92:b8:8c:03:44:43:f6:af:5c:7a:ae:18:7d:30:51]
            modulus: 983c32edf8121691e30fd05430ee5d0834d37cd86ea18cc0072a377d5dc0086d525c8540da34d6a50a87a75a46ea6ca6fadf301c600a143e1d09cf39d96ca769e2de1eab3c71bf3233bb5778ce18460b8ace282784e9536ebf97903454c8a4ce62a45efcc331c240cece41943c05196386fda550d17ce97e760c758c8f21a2bb89654c7e0b3d0446a09cca7e6396638331838b7ef7c924482e9d432391cd03e16180b0c7253f485a54860f1f30691b6038c04613fbd2fb37e096f1e3e87c08e79326d111600993aee498d1b25113b26d934142e38803bfc55561cbac5ec5aeeaeada080839fe10ba95c0978d7889b1c144f7b3cf8dcf48ef1fd63bf789ac378b
    public exponent: 10001

] 
2022-04-02 04:33:31.808  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:33:31.810 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:33:31.811 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:33:31.812 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:33:31.812  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:33:31.812  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:33:31.813  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:33:31.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:33:31.813 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:33:31.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:33:31.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:33:31.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:33:31.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:33:31.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:33:31.957  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:33:31.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:33:31.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:33:31.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:33:31.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:33:31.960  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:33:31.960 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:33:31.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:33:31.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:33:31.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:33:31.962 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:33:31.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:33:31.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:33:31.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:33:31.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:33:31.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:33:31.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: b4b034039b35c83a9c175f7abebbc83386d1471d86fd5c8d5b0e96158cb51306a591cfa5a3d9f7107046c5712ec094619e046afed8cb5d4c79efb18af4732c3dcff7e2e3b65de16eb9049a24964373257a3bf31044dd835b1cd76181dc7af882d68e122ad465f31f37a348a682ada6a82544f71cff4baa74c826ad192288fc3782f5e7b316ee5583720202d4abe4b8599482227d4b8e5c3ef16b08b4a2a5f4efb21540ec286320553fdc4eb16066bffc44caee28805c399f140d1d0505322f1e6aedb34cb14dfd86c0d68d5152609fa49b6cd20b3f85cfa786de9aea4c71bf855b2b1afc84c8b456ef669020ab0ea595025e1554b80df2f87a8e164962c616f247210246cc1ddbafc35dba27d8a474b67f337f57076508e3c7a3ba152ffd822980f1fee97c5dc97f1be82793a69bec3a5b1c3a54a2ba9766447f91ffce79c4509ab2c1a06a4e7dbd5ff346a367e76e86b07b1a0fe3857cc8cb09d16d1db81462a1d828a41753f2a0b854ed483d65408b404683aa9d04b827d58ca58473762771
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2a:54:8f:7e:14:88:db:ed:d5:35:c1:30:a3:1e:fd:c8:bf:4a:b3:99]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:34:05.878  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:34:05.879 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:34:05.882 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:34:05.883 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:34:05.884  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:34:05.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:34:05.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:34:05.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:34:05.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:34:05.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:34:05.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:34:05.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:34:05.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:34:05.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:34:06.041  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:34:06.043  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:34:06.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:34:06.044 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:34:06.046  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:34:06.047  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:34:06.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:06.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:06.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:06.050 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:06.050 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:06.050 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:06.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:06.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:06.052 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:06.053 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:34:06.058 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [74:44:47:b1:6e:65:63:73:34:d0:d3:6b:c7:29:63:7f:64:44:51:5e]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:34:38.365  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:34:38.367 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:34:38.368 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:34:38.368 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:34:38.369  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:34:38.369  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:34:38.370  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:34:38.370 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:34:38.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:34:38.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:34:38.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:34:38.376 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:34:38.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:34:38.377 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:34:38.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:34:38.525  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:34:38.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:34:38.526 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:34:38.527  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:34:38.527  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:34:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:38.528 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:38.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:34:38.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:34:38.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:34:38.530 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:34:38.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:ef:f3:ec:03:c1:27:ef:54:b6:2c:b9:ef:4c:0e:1c:7c:f6:3f:ad]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:36:24.970  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:36:24.980 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:36:24.983 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:36:24.984 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:36:24.985  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:36:24.985  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:36:24.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:36:24.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:36:24.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:36:24.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:36:24.997 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:36:24.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:36:24.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:36:24.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:36:25.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:36:25.175  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:36:25.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:36:25.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:36:25.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:36:25.177  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:36:25.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:36:25.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:36:25.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:36:25.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:36:25.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:36:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:36:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:36:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:36:25.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:36:25.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:36:25.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:2c:78:89:5f:86:c3:77:e0:96:14:42:f9:3e:aa:0e:25:bb:85:51]
            modulus: c0bf73209207a090daded1f211278e533bcc700371886a3aad88d54047826f87933f919a39ddc5b60636ec6146d2a1284427e5b4b27f12c54cd3719b06513a3a520d642eee11dd7d290456e67fafaa0ef6e802b2c5f2464c3e3e5bc23310712754643fec1908a7a92da5eeb6945d3224aace7d3d834a0fe52edcb3ef3282aec710ae2adc3e948768b9ddcafd6021690747a087a3cc3687e62b50e184158d2089b5a7eddb0ae509d5ffa27378ac3f2e348b0fd8dcf0c482cdf3a794f1c257897cb66071d105b72113caabaa511f2cef99d92cdae5a20d42760ebd506f9d74d14315ec022cedad2e35cd51acd45375017ee8a02800d072202a230fd30cddb5da5d
    public exponent: 10001

] 
2022-04-02 04:38:23.249  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:38:23.252 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:38:23.254 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:38:23.255 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:38:23.255  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:38:23.255  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:38:23.256  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:38:23.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:38:23.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:38:23.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:38:23.262 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:38:23.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:38:23.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:38:23.264 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:38:23.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:38:23.400  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:38:23.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:38:23.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:38:23.403  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:38:23.403  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:38:23.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:38:23.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:38:23.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:38:23.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:38:23.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:38:23.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:38:23.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:38:23.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:38:23.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:38:23.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:38:23.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:e1:2d:fa:03:ab:81:aa:db:a0:20:68:4b:c8:f1:06:26:07:dc:3b]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:42:12.606  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:42:12.608 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:42:12.610 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:42:12.611 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:42:12.611  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:42:12.611  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:42:12.612  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:42:12.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:42:12.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:42:12.613 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:42:12.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:42:12.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:42:12.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:42:12.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:42:12.737  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:42:12.738  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:42:12.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:42:12.738 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:42:12.740  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:42:12.741  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:42:12.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:12.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:12.742 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:12.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:12.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:12.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:12.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:12.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:12.745 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:12.746 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:42:12.758 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d8:12:20:c6:5a:67:44:40:08:4e:e8:5c:fd:34:30:9d:71:32:cc:ad]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:42:44.393  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:42:44.394 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:42:44.396 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:42:44.397 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:42:44.398  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 04:42:44.398  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:42:44.398  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:42:44.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:42:44.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:42:44.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:42:44.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:42:44.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:42:44.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:42:44.409 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:42:44.540  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:42:44.541  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:42:44.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:42:44.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:42:44.547  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:42:44.548  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:42:44.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:44.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:44.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:44.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:44.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:44.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:44.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:42:44.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:42:44.553 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:42:44.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:42:44.559 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: b4b034039b35c83a9c175f7abebbc83386d1471d86fd5c8d5b0e96158cb51306a591cfa5a3d9f7107046c5712ec094619e046afed8cb5d4c79efb18af4732c3dcff7e2e3b65de16eb9049a24964373257a3bf31044dd835b1cd76181dc7af882d68e122ad465f31f37a348a682ada6a82544f71cff4baa74c826ad192288fc3782f5e7b316ee5583720202d4abe4b8599482227d4b8e5c3ef16b08b4a2a5f4efb21540ec286320553fdc4eb16066bffc44caee28805c399f140d1d0505322f1e6aedb34cb14dfd86c0d68d5152609fa49b6cd20b3f85cfa786de9aea4c71bf855b2b1afc84c8b456ef669020ab0ea595025e1554b80df2f87a8e164962c616f247210246cc1ddbafc35dba27d8a474b67f337f57076508e3c7a3ba152ffd822980f1fee97c5dc97f1be82793a69bec3a5b1c3a54a2ba9766447f91ffce79c4509ab2c1a06a4e7dbd5ff346a367e76e86b07b1a0fe3857cc8cb09d16d1db81462a1d828a41753f2a0b854ed483d65408b404683aa9d04b827d58ca58473762771
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:65:dd:65:cc:05:10:b3:98:50:78:e5:ba:a5:a7:ee:04:7a:e7:93]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:43:17.503  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:43:17.504 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:43:17.505 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:43:17.506 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:43:17.507  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 04:43:17.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:43:17.508  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:43:17.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:43:17.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:43:17.509 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:43:17.516 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:43:17.517 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:43:17.517 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:43:17.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:43:17.647  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:43:17.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:43:17.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:43:17.648 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:43:17.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:43:17.650  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:43:17.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:43:17.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:43:17.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:43:17.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:43:17.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:43:17.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:43:17.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:43:17.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:43:17.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:43:17.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:43:17.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [42:de:16:e9:98:20:d9:1a:fc:11:6a:75:36:0f:ea:ea:dd:84:47:27]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:45:05.376  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:45:05.379 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:45:05.382 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:45:05.383 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:45:05.384  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 04:45:05.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:45:05.385  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:45:05.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:45:05.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:45:05.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:45:05.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:45:05.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:45:05.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:45:05.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:45:05.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:45:05.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:45:05.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:45:05.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:45:05.561  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:45:05.564  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:45:05.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:45:05.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:45:05.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:45:05.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:45:05.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:45:05.572 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:45:05.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:45:05.573 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:45:05.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:45:05.574 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:45:05.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:15:4d:80:3b:3c:f6:51:71:6b:1b:3f:ee:b0:04:80:2a:a6:02:f8]
            modulus: 9a52e8ed21b8995d5f723c725d67525ba570498c929d010fb8513fde64eab5d9359f3564df3fca993f72020c634c5e66225e84c5c577d2985dced8c18f5d7e1659140fbbce7e84a01744080f7b0134bd2c5f82f88f07f9c0c15482f70f3f83f265e316c2155a82b291bb5c93a03b0d1d65a2083b431a8a919a0455544f5b71a553d49a64fbf57714a0f4bfbfe08b1d0a9d9931e041495d58c306baa562d7aea3e45d2ef201dc68991887d47d9d2927fb3c3d9020fc48035945c57217c7ef0f7971c5157e422a92448eec23588ee9ab1f56bc3eb3d1cd847f673f446b997f5feee87efc7b34048de949d61156709ac044c5e8391fa4c2250930bec534ca7cc321
    public exponent: 10001

] 
2022-04-02 04:55:27.994  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:55:27.996 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:55:27.999 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:55:28.000 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:55:28.001  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-02 04:55:28.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:55:28.002  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:55:28.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:55:28.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:55:28.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:55:28.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:55:28.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:55:28.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:55:28.011 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:55:28.229  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:55:28.230  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:55:28.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:55:28.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:55:28.232  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:55:28.232  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:55:28.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:55:28.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:55:28.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:55:28.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:55:28.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:55:28.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:55:28.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:55:28.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:55:28.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:55:28.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:55:28.240 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:02:bd:b9:7a:21:67:68:7f:a6:22:a0:22:3f:19:0a:90:e6:48:f8]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 04:59:36.831  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 04:59:36.833 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 04:59:36.835 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:59:36.836 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 04:59:36.836  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-02 04:59:36.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 04:59:36.837  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 04:59:36.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 04:59:36.837 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 04:59:36.838 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 04:59:36.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 04:59:36.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:59:36.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 04:59:36.843 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:59:36.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 04:59:36.958  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 04:59:36.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 04:59:36.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 04:59:36.960  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 04:59:36.960  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 04:59:36.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:59:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:59:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:59:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:59:36.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:59:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:59:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 04:59:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 04:59:36.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 04:59:36.963 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 04:59:36.966 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:f2:11:ac:74:ae:af:78:8d:26:1d:48:2a:e5:3e:80:a2:53:c5:7b]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 05:00:09.375  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 05:00:09.377 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 05:00:09.387 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 05:00:09.388 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 05:00:09.388  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-02 05:00:09.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 05:00:09.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 05:00:09.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 05:00:09.392 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 05:00:09.393 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 05:00:09.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 05:00:09.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:00:09.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:00:09.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:00:09.499  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 05:00:09.500  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 05:00:09.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 05:00:09.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:00:09.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 05:00:09.501  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 05:00:09.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:09.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:09.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:09.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:09.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:09.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:09.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:09.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:09.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:09.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 05:00:09.507 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:ec:3a:93:87:a4:d9:65:fd:b9:c3:6a:1f:76:2c:d0:bd:3e:2a:7f]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 05:00:42.266  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 05:00:42.268 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 05:00:42.269 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 05:00:42.270 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 05:00:42.270  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-02 05:00:42.271  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 05:00:42.271  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 05:00:42.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 05:00:42.272 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 05:00:42.273 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 05:00:42.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 05:00:42.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:00:42.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:00:42.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:00:42.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 05:00:42.399  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 05:00:42.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 05:00:42.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:00:42.400  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 05:00:42.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 05:00:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:42.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:42.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:42.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:42.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:00:42.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:00:42.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:00:42.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 05:00:42.407 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:ef:90:07:7a:e9:a9:a9:ec:bd:de:27:06:8a:01:10:c9:8b:e9:f4]
            modulus: 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
    public exponent: 10001

] 
2022-04-02 05:02:29.409  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-02 05:02:29.412 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-02 05:02:29.414 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 05:02:29.415 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-02 05:02:29.416  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-02 05:02:29.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-02 05:02:29.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-02 05:02:29.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-02 05:02:29.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-02 05:02:29.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-02 05:02:29.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-02 05:02:29.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:02:29.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-02 05:02:29.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:02:29.549  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-02 05:02:29.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-02 05:02:29.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-02 05:02:29.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-02 05:02:29.552  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-02 05:02:29.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-02 05:02:29.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:02:29.554 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:02:29.555 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:02:29.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:02:29.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:02:29.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:02:29.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-02 05:02:29.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-02 05:02:29.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-02 05:02:29.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-02 05:02:29.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 78282239838901710645514280921873464183870048424
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Apr 02 03:03:24 UTC 2022
           Final Date: Thu Apr 01 03:03:23 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [4e:ce:a7:76:55:6c:95:8b:4f:91:d5:23:13:91:e7:25:67:9c:15:9b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 77fa9a7a273a02a31fca7498910a9fcb295656b9
                       95f5f565af2bffc2e6a0e429eecf72d2547d8e61
                       8936dac4dd40a1302aa9569baaacc4b68309fe88
                       efd7bac60496a30db7a8e7dae365be683751b377
                       472a3107ba22111d04833c76a0cab7add6a9119f
                       37db0bcbf1c5f0d1cecec5c31469506dcdfe9801
                       e2bc7182f6797eb6df302b70538d9a40ad6f04ea
                       4774042515ee686c39832ec924e923ed0cff5512
                       4b626b6b7d47bc149ed16696ad185a76de7eee52
                       f324d2e33314c5313f6985c3190ea74fb4c08b8e
                       b86a4418da7a2a16c974ebe70e3936064e437e15
                       b685721f00f63f73f77fff7216b8f5fe74a45f14
                       7584af5b08be9902a7e47c18f7d0f386a380bd94
                       05f1da3caf8eb49a2671bb55117e090e5443b27d
                       3e6c55bc1c54f9fdb9e5cc6c76f8ad221ebad34a
                       52572c84f6695dda484220179c492b57d52d8e54
                       1f51a173f34eb6ef754063d829e46e72a1b77691
                       196d81803db094f18668c5811581a75d0d0a0b32
                       45b322153aa18b121f77a8d4879a0f77d06602a1
                       cb7fa31d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:b4:8e:58:87:ed:0d:7e:d3:1f:55:03:4f:ad:bb:2c:0f:6b:85:7e]
            modulus: ed69e89b8fb1b96f8257b73925d6c9a22891e8153d2e2b4983e993bff879ccd7bc33e8136fff8f8926ac96db4ce1ed607e185dc3e5cacd27a797288a60891bc33bd344a0a4361b37b91ea339fbc78c90eaee5e5c447785221eba3826822c0d4fed684d01d2d5ff4608edd1d3e3bfe18e30ece76a54f971f76a60dc6a29d84fc10235aa6377e06392b08ba1b346edc1f843cabc20f8f2d0b8eb21d91fb7a7fb366a3cf56f48bbd25d6283bb51f0a48a121e357f4523b01468faeec029cea59dd5c0f025a0a259848ce67fd252c64ae9bbf147ca4c3a6a7741b37a09a5b51dc63807bb0d211256832d9726966dd52c8c17f0096928de6fb20245f7bfb4b4258679
    public exponent: 10001

]