Results

By type

          2022-04-10 03:03:49,595 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-04-10 03:03:50,539 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-04-10 03:03:51.217  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Apr 10, 2022 3:03:53 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Apr 10, 2022 3:03:53 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Apr 10, 2022 3:03:53 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Apr 10, 2022 3:03:53 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-04-10 03:03:53.652 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-04-10 03:03:53.970  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-04-10 03:03:54.141  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-04-10 03:03:54.851 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-04-10 03:03:54.854 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-04-10 03:03:54.856 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-04-10 03:03:54.862 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-04-10 03:03:54.908 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-04-10 03:03:54.913 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-04-10 03:03:55.049 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-04-10 03:03:55.557 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Apr 10, 2022 3:03:56 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-04-10 03:03:56.503  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.667 seconds (JVM running for 9.457)
Apr 10, 2022 3:04:23 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-04-10 03:04:46.331  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 03:04:46.338 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 03:04:46.375 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-10 03:04:46.379 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 03:04:46.395  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-04-10 03:04:46.397  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 03:04:46.398  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 03:04:46.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:04:46.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:04:46.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 03:04:46.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 03:04:46.413 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 03:04:46.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 03:04:46.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:04:46.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 03:04:46.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:04:47.320  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 03:04:47.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 03:04:47.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 03:04:47.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 03:04:47.334  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 03:04:47.335  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 03:04:47.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:04:47.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:04:47.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:04:47.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:04:47.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:04:47.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:04:47.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 03:04:47.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 03:04:47.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 03:04:47.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 03:04:47.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:ad:5b:01:a8:e4:5b:78:2a:a9:7a:90:f1:c1:9a:26:6d:de:eb:49]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:22:02.313  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:22:02.316 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:22:02.321 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 04:22:02.323 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:22:02.324  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 04:22:02.326  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:22:02.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:22:02.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:22:02.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:22:02.332 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:22:02.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:22:02.359 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:22:02.359 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:22:02.360 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:22:02.823  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:22:02.825  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:22:02.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:22:02.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:22:02.829  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:22:02.830  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:22:02.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:22:02.831 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:22:02.832 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:22:02.833 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:22:02.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:22:02.834 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:22:02.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:22:02.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:22:02.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:22:02.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:22:02.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: d69d81ada10f964469ad777ebd6906405b98930ec1e44986180da35af38648a8d5f3d5c6633dc0e450defab28be996e8dfb26ae60d35aa7eaec1f68a489144b749a26455f5f6a86363431b3c75637e46e1fba4d34cb42abe642406af700145fc1ca39ac5afd709561af63b952ade95ee31a5e0f5fff75abdde3b2e09674c7ce4aa7860a8c08efb2d36d62fad6e7c73d853ce3f720946978a671a2eb38ea7914cae15316384dc00d53df204b9d8f83def4cb2bb72526a7549b53e31c4aba27476829a01d2a20a868ed9beefcc09eb813d9ae81ad0b0f46be676600c605fcd0b14e0313811c865f60521650e83ea97d8a13bea269fa1bd1d57c2052c17698be4181e884dfc19b3542704d03dfa4de160899179e473596cabb7d55bdd28f4e96bf6e67e0119f4aa5b74496076e81f58ac8b2a84f838c7a5fd12feb3e900787b4c3bdb21178cd9caccb4a13b26c0927328a90f9a3326777ba5fdcc1f35fac58c9152dfccb6334d2ff230ab46ead38b36f9f1d3ac38304b0420dfd0a89cb87fa50503
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:ad:be:28:9a:61:31:4f:78:88:f2:c7:f9:23:12:0d:f4:bc:91:69]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:23:32.701  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:23:32.703 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:23:32.704 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:23:32.705 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:23:32.706  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:23:32.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:23:32.707  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:23:32.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:23:32.708 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:23:32.709 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:23:32.715 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:23:32.716 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:23:32.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:23:32.717 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:23:33.093  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:23:33.094  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:23:33.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:23:33.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:23:33.098  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:23:33.098  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:23:33.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:23:33.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:23:33.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:23:33.100 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:23:33.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:23:33.101 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:23:33.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:23:33.102 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:23:33.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:23:33.104 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:23:33.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7c:f1:32:ed:c0:a2:73:dd:b8:0f:78:be:09:ae:70:8a:e7:37:3b:44]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:25:12.131  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:25:12.134 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:25:12.136 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:25:12.137 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:25:12.139  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:25:12.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:25:12.140  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:25:12.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:25:12.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:25:12.142 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:25:12.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:25:12.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:25:12.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:25:12.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:25:12.387  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:25:12.388  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:25:12.388 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:25:12.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:25:12.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:25:12.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:25:12.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:25:12.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:25:12.393 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:25:12.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:25:12.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:25:12.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:25:12.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:25:12.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:25:12.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:25:12.399 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:25:12.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:95:0d:d9:39:a3:33:af:16:cb:52:bd:b4:39:38:be:68:9c:82:f3]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:26:35.616  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:26:35.619 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:26:35.621 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:26:35.622 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:26:35.622  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:26:35.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:26:35.623  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:26:35.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:26:35.624 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:26:35.625 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:26:35.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:26:35.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:26:35.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:26:35.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:26:35.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:26:35.969  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:26:35.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:26:35.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:26:35.972  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:26:35.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:26:35.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:26:35.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:26:35.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:26:35.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:26:35.976 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:26:35.977 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:26:35.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:26:35.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:26:35.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:26:35.980 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:26:35.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:e5:80:92:f5:59:42:17:df:b6:43:9e:7e:9c:44:16:9f:49:e2:a2]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:27:01.109  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:27:01.111 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:27:01.114 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-10 04:27:01.116 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:27:01.118  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2022-04-10 04:27:01.119  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:27:01.119  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:27:01.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:27:01.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:27:01.121 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:27:01.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:27:01.127 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:01.127 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:01.128 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:01.373  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:27:01.375  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:27:01.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:27:01.376 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:01.377  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:27:01.378  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:27:01.378 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:01.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:01.379 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:01.380 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:01.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:01.381 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:01.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:01.382 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:01.383 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:01.384 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:27:01.387 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:1b:6b:68:61:74:07:0b:a5:37:61:12:56:f3:ba:50:37:e4:76:05]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:27:09.802  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:27:09.803 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:27:09.804 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-10 04:27:09.805 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:27:09.805  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-10 04:27:09.806  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:27:09.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:27:09.807 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:27:09.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:27:09.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:27:09.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:27:09.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:09.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:09.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:10.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:27:10.066  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:27:10.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:27:10.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:10.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:27:10.069  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:27:10.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:10.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:10.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:10.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:10.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:10.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:10.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:10.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:10.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:10.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:27:10.077 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:63:16:4a:b2:4a:78:ce:1c:32:03:2e:72:9d:f9:1d:c6:90:4f:6e]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:27:51.961  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:27:51.962 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:27:51.963 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-10 04:27:51.963 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:27:51.964  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-10 04:27:51.964  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:27:51.965  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:27:51.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:27:51.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:27:51.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:27:51.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:27:51.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:51.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:27:51.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:52.444  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:27:52.444  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:27:52.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:27:52.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:27:52.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:27:52.446  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:27:52.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:52.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:52.447 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:52.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:52.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:52.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:52.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:27:52.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:27:52.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:27:52.451 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:27:52.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:7a:5d:87:9e:e1:df:96:ce:b0:f6:82:d0:dc:df:ca:48:37:59:3e]
            modulus: e17d8df4a089dffb1a44afe47872f24f858086d09fbefaa4ab3baad4c953508f4f001bba76601ef5b59a753deeb6df15cca2df906f5081e1b753bb0550a05ed7f3e8254fadc0ce6127fd62f54a41213ba07fcff79b01475d3d8f2cfa17c452358ef44bc42c5aa289fc65dadd30776a731963b8a5d540d029dbe4bc2e1ae8c12b8a6652299edc0dd6b56e71c39bfc7f8849b99d50499db4fa7d432037f5551a2631aa8376a4ee28d0077b06864241e0550ce593e53457dde7255d22d9e6f0c6faa0eca0992f912b2d480999b672c715bbc48a3c32c3a43ef62b9c0fb90e332c28f876af5d7d0cd1d23b378c799b1fe69281d25923a14d12d661a36af452e92ce7
    public exponent: 10001

] 
2022-04-10 04:29:36.939  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:29:36.942 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:29:36.945 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:29:36.947 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:29:36.947  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:29:36.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:29:36.948  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:29:36.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:29:36.949 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:29:36.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:29:36.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:29:36.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:29:36.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:29:36.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:29:37.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:29:37.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:29:37.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:29:37.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:29:37.137  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:29:37.138  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:29:37.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:29:37.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:29:37.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:29:37.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:29:37.140 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:29:37.141 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:29:37.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:29:37.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:29:37.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:29:37.144 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:29:37.148 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:ff:cf:48:6d:59:18:00:64:0c:9b:e0:7b:5f:a2:1f:a0:7a:98:82]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:40:28.018  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:40:28.020 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:40:28.024 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 04:40:28.025 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:40:28.026  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-04-10 04:40:28.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:40:28.027  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:40:28.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:40:28.028 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:40:28.029 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:40:28.036 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:40:28.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:40:28.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:40:28.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:40:28.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:40:28.407  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:40:28.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:40:28.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:40:28.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:40:28.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:40:28.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:40:28.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:40:28.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:40:28.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:40:28.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:40:28.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:40:28.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:40:28.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:40:28.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:40:28.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:40:28.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:e8:d0:cb:49:6a:52:1d:a6:29:ff:69:a1:93:2e:81:0c:ff:36:4a]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:44:22.110  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:44:22.117 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:44:22.120 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:44:22.122 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:44:22.122  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-04-10 04:44:22.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:44:22.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:44:22.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:44:22.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:44:22.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:44:22.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:44:22.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:44:22.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:44:22.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:44:22.373  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:44:22.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:44:22.374 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:44:22.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:44:22.376  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:44:22.376  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:44:22.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:22.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:22.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:22.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:22.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:22.378 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:22.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:22.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:22.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:22.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:44:22.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:df:2b:99:1a:11:d0:b9:ad:ee:09:aa:02:84:8e:18:c4:ab:73:00]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:44:55.717  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:44:55.719 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:44:55.720 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-10 04:44:55.721 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:44:55.722  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2022-04-10 04:44:55.723  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:44:55.723  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:44:55.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:44:55.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:44:55.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:44:55.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:44:55.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:44:55.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:44:55.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:44:55.942  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:44:55.943  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:44:55.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:44:55.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:44:55.945  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:44:55.946  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:44:55.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:55.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:55.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:55.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:55.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:55.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:55.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:44:55.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:44:55.950 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:44:55.951 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:44:55.954 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:5f:f0:d6:40:b5:00:fd:47:e2:8c:37:9f:85:ce:20:11:b1:80:ad]
            modulus: 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
    public exponent: 10001

] 
2022-04-10 04:45:32.500  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:45:32.501 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:45:32.503 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-10 04:45:32.503 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:45:32.504  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2022-04-10 04:45:32.505  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:45:32.505  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:45:32.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:45:32.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:45:32.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:45:32.511 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:45:32.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:45:32.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:45:32.512 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:45:32.753  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:45:32.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:45:32.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:45:32.754 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:45:32.756  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:45:32.757  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:45:32.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:45:32.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:45:32.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:45:32.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:45:32.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:45:32.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:45:32.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:45:32.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:45:32.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:45:32.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:45:32.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: d69d81ada10f964469ad777ebd6906405b98930ec1e44986180da35af38648a8d5f3d5c6633dc0e450defab28be996e8dfb26ae60d35aa7eaec1f68a489144b749a26455f5f6a86363431b3c75637e46e1fba4d34cb42abe642406af700145fc1ca39ac5afd709561af63b952ade95ee31a5e0f5fff75abdde3b2e09674c7ce4aa7860a8c08efb2d36d62fad6e7c73d853ce3f720946978a671a2eb38ea7914cae15316384dc00d53df204b9d8f83def4cb2bb72526a7549b53e31c4aba27476829a01d2a20a868ed9beefcc09eb813d9ae81ad0b0f46be676600c605fcd0b14e0313811c865f60521650e83ea97d8a13bea269fa1bd1d57c2052c17698be4181e884dfc19b3542704d03dfa4de160899179e473596cabb7d55bdd28f4e96bf6e67e0119f4aa5b74496076e81f58ac8b2a84f838c7a5fd12feb3e900787b4c3bdb21178cd9caccb4a13b26c0927328a90f9a3326777ba5fdcc1f35fac58c9152dfccb6334d2ff230ab46ead38b36f9f1d3ac38304b0420dfd0a89cb87fa50503
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:fe:28:77:12:e5:29:c0:54:2c:18:86:7c:a3:1f:70:15:e7:05:ed]
            modulus: d1b16d427970acd32bb4d3cd0222887fc296689bb90328cb4e3185bd1c1922eb6bf77b08dc3cc94a825b350b17d4df6edba1d4d555a0c83c2728dc3aff94216fb05efaf73d561358afe4c390aa668e503b687b5689fa5d54fc4d4ce34a00710265adc9cefe9b8dffaa407118ddbc5bc43499ce722297f9f5977527646ab8f41f247d62a7f06f43b35858a7756c315caf1de98f257c52917fd1fc3f63850332c5fd7c7402f5ff3e8b3ba942e9a701cf27e40b4793593cf196bbd4e117b543f1d78c28eaa76a378b464cc009eef33a4962434d8da275d366f9da7d267595f3737a877e067667020a49b3182a3e77ad586b6c6739f178adc2ae170c15151ccb2467
    public exponent: 10001

] 
2022-04-10 04:47:24.242  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-04-10 04:47:24.243 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-04-10 04:47:24.245 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:47:24.245 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-04-10 04:47:24.246  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2022-04-10 04:47:24.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-04-10 04:47:24.247  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-04-10 04:47:24.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-04-10 04:47:24.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-04-10 04:47:24.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-04-10 04:47:24.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-04-10 04:47:24.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:47:24.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-04-10 04:47:24.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:47:24.390  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-04-10 04:47:24.391  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-04-10 04:47:24.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-04-10 04:47:24.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-04-10 04:47:24.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-04-10 04:47:24.393  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-04-10 04:47:24.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:47:24.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:47:24.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:47:24.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:47:24.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:47:24.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:47:24.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-04-10 04:47:24.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-04-10 04:47:24.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-04-10 04:47:24.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-04-10 04:47:24.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 445513826418711762560157680367886515955806925775
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Apr 10 03:00:26 UTC 2022
           Final Date: Fri Apr 09 03:00:25 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [97:23:39:1b:65:54:af:20:a3:d9:96:8d:8b:9a:11:ea:5a:60:cf:11]
            modulus: d69d81ada10f964469ad777ebd6906405b98930ec1e44986180da35af38648a8d5f3d5c6633dc0e450defab28be996e8dfb26ae60d35aa7eaec1f68a489144b749a26455f5f6a86363431b3c75637e46e1fba4d34cb42abe642406af700145fc1ca39ac5afd709561af63b952ade95ee31a5e0f5fff75abdde3b2e09674c7ce4aa7860a8c08efb2d36d62fad6e7c73d853ce3f720946978a671a2eb38ea7914cae15316384dc00d53df204b9d8f83def4cb2bb72526a7549b53e31c4aba27476829a01d2a20a868ed9beefcc09eb813d9ae81ad0b0f46be676600c605fcd0b14e0313811c865f60521650e83ea97d8a13bea269fa1bd1d57c2052c17698be4181e884dfc19b3542704d03dfa4de160899179e473596cabb7d55bdd28f4e96bf6e67e0119f4aa5b74496076e81f58ac8b2a84f838c7a5fd12feb3e900787b4c3bdb21178cd9caccb4a13b26c0927328a90f9a3326777ba5fdcc1f35fac58c9152dfccb6334d2ff230ab46ead38b36f9f1d3ac38304b0420dfd0a89cb87fa50503
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 40d8127be7213a50393779bfbef0d7d1c9fe6863
                       efbdf0a8fad737434c3c9a745a60ae5ababfe96b
                       56c78585b1fb3efaf2bff58afcdc69b623521050
                       a1fbfd2145e8e2f561f827c744e535db97f7f9df
                       bc3a573df3830aeab144263937bc12db08dd426d
                       cb82f3c09d44fa44fc8538919a4e38ea89ce8b3e
                       95f51acd5f92d202ee80eb3c568f918f3e2714a2
                       64dd1779bb8a8cd5ccb937a02350e50306cdf706
                       4eb636d21d07da50dab247ce2d5a9b4fb626d44f
                       567afaf2605160fb46838ac1c1107f46e36987db
                       92479b584df7e8ae58c28cd2885b65d9e83ff12c
                       7176d27a15dac255260716fe5606f5306e529b1b
                       71187cef17a856947f200addc3f8cfe79ab94a8b
                       436b930f452ec60a61f14f634e1f317867dfc7bc
                       4ffa87a1300da289656430392b0dd384e610256e
                       41a1da65390e54dc14f47a5f0daf3ae6d8a649d2
                       41fb88a876aef79ca983e148b29287b8ee5d812e
                       4879621839d962f48c93afdc385709df4a7cba41
                       0c6d348816ddd21def5f90e0e6c4ac95a1693596
                       9e835745
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:cf:5a:42:af:d1:bb:ce:1b:1f:7b:45:8a:7e:8c:85:6e:de:c1:12]
            modulus: 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
    public exponent: 10001

]