Results

By type

          2021-09-24 05:59:10,063 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-24 05:59:11,063 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-24 05:59:11.895  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-24 05:59:15.132 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-24 05:59:15.408  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-24 05:59:15.581  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-24 05:59:17.922  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.542 seconds (JVM running for 10.432)
2021-09-24 06:05:01.869  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 06:05:01.893 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 06:05:01.958 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-24 06:05:01.965 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 06:05:01.995  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-24 06:05:02.000  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 06:05:02.002  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 06:05:02.007 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 06:05:02.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 06:05:02.012 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 06:05:02.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 06:05:02.039 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 06:05:02.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 06:05:02.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 06:05:02.121 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 06:05:02.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 06:05:03.159  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 06:05:03.164  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 06:05:03.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 06:05:03.169 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 06:05:03.182  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 06:05:03.185  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 06:05:03.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 06:05:03.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 06:05:03.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 06:05:03.205 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 06:05:03.206 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 06:05:03.206 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 06:05:03.216 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 06:05:03.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 06:05:03.219 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 06:05:03.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 06:05:03.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:3d:70:ba:b4:7c:09:18:56:85:d1:c1:5d:99:99:9f:42:02:f7:64]
            modulus: b8de4cf593ff50a381881aafe26852aead1f50b01c07adfd1a06a768d5c9ae834ac2ae58cd34be57544f16f1f7611651951ae923f691799df0f5fe6964f64091fb1f26870d45c8362be7635ecba08237f59e5595d6b1d47143a7a773cab96fa266ee64ef144d368e799930421bc6f28aede765960d56d576d2e8ea5257cab74b65f28bfd5d028431a1a75a5c1a95ba12291c4338a067da94d7b9950fa6d3dca7db469184692dab511d6e3dd1a309f6a0a2fe9d745902d13f987335965e3a520a22773a07f0977c9ba0102b20baa09764ac3048091a9e1b51cc499ce967fdd239de5b186f6316d3e81a207e8a7a550da787e14c627cdfa2c5d0c1b434781781c7
    public exponent: 10001

] 
2021-09-24 08:37:56.238  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:37:56.242 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:37:56.248 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 08:37:56.249 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:37:56.251  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 08:37:56.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:37:56.253  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:37:56.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:37:56.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:37:56.257 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:37:56.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:37:56.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:37:56.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:37:56.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:37:56.481  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:37:56.483  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:37:56.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:37:56.484 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:37:56.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:37:56.490  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:37:56.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:37:56.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:37:56.492 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:37:56.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:37:56.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:37:56.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:37:56.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:37:56.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:37:56.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:37:56.499 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:37:56.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:26:d6:ee:e6:25:4b:97:c9:c8:de:53:27:e9:e8:9f:21:7b:5b:65]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:41:08.306  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:41:08.310 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:41:08.315 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 08:41:08.317 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:41:08.318  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 08:41:08.319  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:41:08.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:41:08.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:41:08.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:41:08.324 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:41:08.338 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:41:08.339 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:41:08.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:41:08.340 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:41:08.514  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:41:08.515  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:41:08.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:41:08.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:41:08.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:41:08.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:41:08.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:41:08.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:41:08.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:41:08.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:41:08.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:41:08.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:41:08.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:41:08.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:41:08.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:41:08.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:41:08.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:ab:1b:7c:68:f4:0c:87:67:d9:94:5e:6d:48:f3:a6:0f:bb:f6:ea]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:43:03.095  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:43:03.099 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:43:03.103 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 08:43:03.105 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:43:03.105  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 08:43:03.107  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:43:03.108  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:43:03.108 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:43:03.109 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:43:03.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:43:03.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:43:03.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:03.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:03.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:03.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:43:03.350  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:43:03.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:43:03.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:03.362  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:43:03.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:43:03.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:03.366 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:03.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:03.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:03.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:03.371 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:03.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:03.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:03.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:03.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:43:03.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [01:be:8a:0e:6f:ef:55:20:7a:22:86:92:dd:4c:92:69:80:f4:84:f7]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:43:04.235  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:43:04.237 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:43:04.239 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 08:43:04.240 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:43:04.240  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 08:43:04.241  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:43:04.242  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:43:04.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:43:04.242 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:43:04.243 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:43:04.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:43:04.251 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:04.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:04.252 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:04.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:43:04.370  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:43:04.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:43:04.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:04.374  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:43:04.375  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:43:04.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:04.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:04.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:04.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:04.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:04.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:04.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:04.382 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:04.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:04.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:43:04.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:1a:e8:e4:11:73:3d:9b:cd:00:1a:fa:88:a4:db:b5:26:7f:e6:04]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:43:35.196  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:43:35.198 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:43:35.201 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 08:43:35.202 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:43:35.203  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 08:43:35.204  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:43:35.205  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:43:35.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:43:35.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:43:35.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:43:35.213 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:43:35.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:35.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:43:35.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:35.368  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:43:35.369  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:43:35.369 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:43:35.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:43:35.372  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:43:35.373  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:43:35.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:35.374 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:35.375 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:35.376 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:35.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:35.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:35.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:43:35.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:43:35.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:43:35.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:43:35.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:fe:9e:1b:8e:b9:d4:14:5c:c2:06:0f:bf:87:8f:dd:1b:e9:22:17]
            modulus: be4f27230987d29f14fef58348c1707251fd779d4f191f681a1b5b90f19813416d384596f027f3d30d117f876265878f9050fd536955f3cadb08cddea3fb337985f39f7f5cfde6256a2bdfb22d0ee47bf10d3f7f4bc15ed983dbe03849fd653d86205de596263cc58c27333e7af3090465b8570ca8f778c57c3c5000a43cda3441773de8bf4791c900f3c5d844983b69152e79d74bc9089d33d697a291fbb30894d8be9e8b6864aafad56387df80af3e8a564474f95eb06b79b01360ac8e2bc8940424d4a9f77ab51d4a21bea6bf7be6b41259fc5b0622cad30ad668a285b056370a804a7a248184a7cb09f9a1f53bbc85dea6707e1ba2e1f2d507c38b900333
    public exponent: 10001

] 
2021-09-24 08:44:09.314  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:44:09.319 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:44:09.324 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 08:44:09.326 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:44:09.326  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 08:44:09.327  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:44:09.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:44:09.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:44:09.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:44:09.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:44:09.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:44:09.338 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:44:09.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:44:09.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:44:09.510  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:44:09.510  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:44:09.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:44:09.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:44:09.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:44:09.513  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:44:09.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:44:09.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:44:09.515 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:44:09.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:44:09.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:44:09.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:44:09.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:44:09.518 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:44:09.519 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:44:09.520 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:44:09.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bc:20:3f:c6:df:2f:81:1b:1e:1c:35:aa:b5:32:4f:b9:8e:d3:10:20]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:45:34.994  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:45:34.998 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:45:35.003 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 08:45:35.005 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:45:35.006  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-24 08:45:35.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:45:35.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:45:35.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:45:35.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:45:35.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:45:35.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:45:35.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:45:35.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:45:35.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:45:35.214  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:45:35.215  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:45:35.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:45:35.216 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:45:35.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:45:35.220  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:45:35.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:45:35.221 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:45:35.222 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:45:35.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:45:35.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:45:35.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:45:35.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:45:35.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:45:35.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:45:35.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:45:35.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:8a:a3:28:44:68:bb:09:79:f9:08:d1:a4:8c:89:0d:1a:d7:5f:0c]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:46:16.794  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:46:16.799 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:46:16.804 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 08:46:16.805 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:46:16.806  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 08:46:16.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:46:16.808  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:46:16.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:46:16.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:46:16.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:46:16.816 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:46:16.817 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:46:16.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:46:16.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:46:16.996  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:46:16.997  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:46:16.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:46:16.998 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:46:17.001  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:46:17.001  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:46:17.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:46:17.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:46:17.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:46:17.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:46:17.005 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:46:17.006 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:46:17.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:46:17.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:46:17.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:46:17.009 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:46:17.013 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:2e:d9:30:89:ba:9b:08:3e:19:5b:01:61:d7:2a:ed:ac:be:6f:90]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 08:58:56.966  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 08:58:56.970 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 08:58:56.973 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 08:58:56.975 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 08:58:56.976  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 08:58:56.976  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 08:58:56.977  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 08:58:56.977 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 08:58:56.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 08:58:56.978 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 08:58:56.985 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 08:58:56.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:58:56.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 08:58:56.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:58:57.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 08:58:57.149  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 08:58:57.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 08:58:57.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 08:58:57.156  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 08:58:57.157  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 08:58:57.160 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:58:57.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:58:57.161 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:58:57.163 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:58:57.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:58:57.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:58:57.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 08:58:57.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 08:58:57.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 08:58:57.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 08:58:57.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:94:53:ab:8f:47:d1:2c:59:c6:40:bd:4b:55:6c:a4:a3:a3:2c:28]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:02:47.678  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:02:47.690 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:02:47.695 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:02:47.696 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:02:47.697  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:02:47.697  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:02:47.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:02:47.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:02:47.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:02:47.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:02:47.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:02:47.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:02:47.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:02:47.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:02:47.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:02:47.871  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:02:47.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:02:47.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:02:47.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:02:47.875  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:02:47.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:02:47.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:02:47.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:02:47.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:02:47.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:02:47.881 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:02:47.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:02:47.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:02:47.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:02:47.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:02:47.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:c6:de:c8:63:2d:0b:70:c1:46:bf:e0:bc:cd:4f:18:02:a8:dd:ee]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:03:18.712  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:03:18.716 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:03:18.719 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:03:18.721 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:03:18.722  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:03:18.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:03:18.724  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:03:18.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:03:18.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:03:18.726 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:03:18.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:03:18.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:03:18.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:03:18.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:03:18.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:03:18.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:03:18.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:03:18.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:03:18.897  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:03:18.898  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:03:18.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:18.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:18.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:18.901 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:18.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:18.904 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:18.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:18.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:18.906 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:18.908 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:03:18.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:be:bf:5f:d7:af:ca:53:ab:25:3e:10:17:91:d5:b5:61:3d:99:d1]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:03:51.559  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:03:51.561 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:03:51.562 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:03:51.564 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:03:51.565  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:03:51.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:03:51.566  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:03:51.567 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:03:51.568 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:03:51.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:03:51.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:03:51.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:03:51.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:03:51.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:03:51.704  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:03:51.705  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:03:51.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:03:51.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:03:51.707  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:03:51.708  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:03:51.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:51.709 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:51.710 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:51.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:51.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:51.712 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:51.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:03:51.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:03:51.714 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:03:51.715 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:03:51.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:53:64:9f:f4:13:ed:2b:b9:c8:98:c7:40:15:28:a8:23:9d:55:85]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:05:38.949  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:05:38.953 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:05:38.958 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 09:05:38.960 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:05:38.960  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 09:05:38.961  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:05:38.961  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:05:38.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:05:38.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:05:38.963 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:05:38.969 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:05:38.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:05:38.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:05:38.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:05:39.128  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:05:39.129  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:05:39.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:05:39.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:05:39.132  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:05:39.132  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:05:39.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:05:39.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:05:39.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:05:39.136 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:05:39.143 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:05:39.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:05:39.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:05:39.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:05:39.146 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:05:39.156 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:05:39.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:e5:36:3c:63:35:ae:1b:8b:b2:3b:c5:5d:16:67:16:5e:8a:5f:d3]
            modulus: d98efdfc8bee006900f10fbfbee6e6100bf6d1e5dea98f3a453ad504a1359dbc97ee842bc4d69aac18287ea2872f86049f6632e3c02c7230272931bd8b81f855929df2c5699492a46717b4bc2b49483bd5055d6e5f9c3a38e9bdd2d5c49ad6c0a5e564dd61644e7f6f81f97f940f4dd447fadc1cb03bbca0733fa21b37f24c1631b462d80bb34c06cdb92e322f8e066efd695506bee4defbfc25d90d196d3e8d57cdcc7f431b4f8c694b9e63b5afaf3d5e3ecbe5171534fb0529fe46071dd1a147d48431fc12fac1294cb0aa0d9e8229671b16fcbe1de510be977ba42f676041a2e11cbb95634768eb778cf85a8f634766fd1c3a1f4b5c59567b67ffccea240d
    public exponent: 10001

] 
2021-09-24 09:06:28.982  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:06:28.985 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:06:28.987 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 09:06:28.988 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:06:28.989  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 09:06:28.989  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:06:28.990  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:06:28.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:06:28.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:06:28.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:06:28.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:06:28.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:06:28.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:06:28.998 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:06:29.155  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:06:29.156  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:06:29.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:06:29.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:06:29.158  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:06:29.159  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:06:29.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:06:29.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:06:29.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:06:29.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:06:29.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:06:29.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:06:29.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:06:29.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:06:29.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:06:29.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:06:29.174 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:ed:6b:75:1e:1f:cb:b1:25:9a:83:24:ac:1c:52:54:3f:d2:78:31]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:10:37.775  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:10:37.778 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:10:37.780 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:10:37.781 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:10:37.781  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:10:37.782  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:10:37.783  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:10:37.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:10:37.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:10:37.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:10:37.789 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:10:37.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:10:37.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:10:37.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:10:38.007  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:10:38.008  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:10:38.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:10:38.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:10:38.011  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:10:38.012  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:10:38.012 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:10:38.013 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:10:38.013 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:10:38.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:10:38.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:10:38.016 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:10:38.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:10:38.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:10:38.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:10:38.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:10:38.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:76:a4:c1:ab:b6:80:bd:dc:29:43:b9:32:b3:7c:3f:ab:38:bf:cb]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:11:10.829  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:11:10.830 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:11:10.832 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:11:10.833 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:11:10.834  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:11:10.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:11:10.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:11:10.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:11:10.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:11:10.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:11:10.863 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:11:10.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:11:10.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:11:10.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:11:11.008  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:11:11.009  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:11:11.009 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:11:11.010 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:11:11.011  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:11:11.012  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:11:11.012 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:11.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:11.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:11.013 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:11.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:11.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:11.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:11.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:11.015 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:11.018 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:11:11.030 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [77:c1:57:85:da:7b:8a:d3:bd:a0:e0:50:01:5b:f2:9a:11:be:3e:e4]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:11:42.944  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:11:42.947 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:11:42.950 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:11:42.951 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:11:42.952  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:11:42.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:11:42.953  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:11:42.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:11:42.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:11:42.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:11:42.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:11:42.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:11:42.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:11:42.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:11:43.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:11:43.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:11:43.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:11:43.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:11:43.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:11:43.127  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:11:43.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:43.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:43.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:43.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:43.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:43.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:43.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:11:43.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:11:43.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:11:43.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:11:43.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [55:18:5e:16:53:c8:63:ca:1e:f1:5a:56:10:72:29:7a:86:90:8b:cc]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:14:21.811  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:14:21.816 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:14:21.820 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 09:14:21.822 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:14:21.823  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-24 09:14:21.824  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:14:21.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:14:21.825 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:14:21.826 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:14:21.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:14:21.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:14:21.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:14:21.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:14:21.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:14:22.012  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:14:22.013  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:14:22.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:14:22.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:14:22.016  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:14:22.016  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:14:22.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:14:22.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:14:22.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:14:22.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:14:22.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:14:22.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:14:22.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:14:22.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:14:22.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:14:22.022 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:14:22.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:2a:ad:0f:52:99:1a:b2:a6:ee:08:ae:59:00:e8:bb:19:66:c0:2c]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:18:26.520  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:18:26.526 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:18:26.530 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:18:26.532 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:18:26.533  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-24 09:18:26.534  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:18:26.535  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:18:26.535 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:18:26.536 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:18:26.537 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:18:26.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:18:26.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:18:26.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:18:26.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:18:26.715  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:18:26.716  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:18:26.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:18:26.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:18:26.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:18:26.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:18:26.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:18:26.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:18:26.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:18:26.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:18:26.732 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:18:26.732 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:18:26.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:18:26.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:18:26.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:18:26.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:18:26.752 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:92:74:e4:77:b2:6f:fe:ee:36:34:c5:8b:fb:a4:f3:e3:54:69:8c]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:18:59.908  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:18:59.910 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:18:59.912 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:18:59.913 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:18:59.914  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-24 09:18:59.914  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:18:59.915  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:18:59.915 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:18:59.916 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:18:59.917 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:18:59.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:18:59.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:18:59.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:18:59.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:19:00.066  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:19:00.067  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:19:00.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:19:00.067 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:19:00.068  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:19:00.069  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:19:00.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:00.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:00.069 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:00.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:00.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:00.070 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:00.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:00.071 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:00.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:00.072 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:19:00.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:4c:0c:e2:dc:d6:15:76:ff:24:6b:fd:32:26:05:3b:41:2d:b3:6f]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:19:33.977  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:19:33.980 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:19:33.982 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:19:33.983 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:19:33.984  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-24 09:19:33.985  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:19:33.986  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:19:33.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:19:33.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:19:33.987 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:19:33.992 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:19:33.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:19:33.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:19:33.993 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:19:34.167  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:19:34.168  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:19:34.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:19:34.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:19:34.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:19:34.170  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:19:34.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:34.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:34.171 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:34.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:34.172 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:34.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:34.173 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:19:34.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:19:34.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:19:34.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:19:34.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0d:ef:e4:1d:7e:fc:5a:66:c4:3e:96:0b:30:74:12:55:9c:f2:43:b4]
            modulus: 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
    public exponent: 10001

] 
2021-09-24 09:21:21.320  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-24 09:21:21.323 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-24 09:21:21.327 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 09:21:21.328 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-24 09:21:21.329  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-24 09:21:21.330  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-24 09:21:21.330  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-24 09:21:21.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-24 09:21:21.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-24 09:21:21.332 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-24 09:21:21.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-24 09:21:21.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:21:21.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-24 09:21:21.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:21:21.499  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-24 09:21:21.501  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-24 09:21:21.501 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-24 09:21:21.502 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-24 09:21:21.505  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-24 09:21:21.506  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-24 09:21:21.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:21:21.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:21:21.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:21:21.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:21:21.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:21:21.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:21:21.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-24 09:21:21.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-24 09:21:21.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-24 09:21:21.515 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-24 09:21:21.525 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 126817217815847603378743719499688495463961196589
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Sep 24 05:56:21 UTC 2021
           Final Date: Wed Sep 24 05:56:20 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [51:97:eb:65:11:57:47:ab:74:a8:ef:c1:fb:bd:ae:6b:ff:76:21:b3]
            modulus: c82c11f210e162d3de9a78f24bb29fc408b39fa79ea919a2feabd9dd3e3f59541c07e60fea34f287acc1318d377dd5b27ca95eef276c74f39fe61009db77f8ca926ea2c027784900da1d15742a3e4e83a7250047195ef5cfa43a90a60d6d97db58a773958a65e3dae3bb4517c9638491ce0788a7be9f8c473bb0227316467fd906aa14d4669f22253291b7ed6a5b31b94df64ab9a698eb18a72bdf41d3cfd51edcfd7281094c507e7fffa7f5c4b2e07f5e0d3e9c153fcde9381cc9c2fe641ed5be581fe7b44e410430e848b00eb3d5b4239c4acaad9805e8c1386e124a32529b6551ef92a9d259eb53ab2df209a685405e2def6292260e181ec39b2cfe2fdbc76d1d9b0ac87b96ee4099f25563be8cab57bf36a782858cbd111b258702926ce06d8e02bebe17460293278fac3ad8dbd0b9813c9e12ee692199889dc89b910a8c624bf335df10c1c83cf9d0a69c4fca61b1dbba3370a53c1ec2ac936b1825e5210580adb4baeec7cba0002d9c07cff34b674218018c80b52be4fd596aa3708e0f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 79fd85035ea2ee6da0ce0dd77a33556f8f537bd9
                       03f7ef7510231606f4780c1adc882ab78f04bbb2
                       50131896a4c0bf40e98c33f64d86dba171fbff02
                       8b73e21567e23a765e5979cc80395dc90043816d
                       b8d5063a5fd570a2b446e32dc9de84550e5c0018
                       287734f96fe43fecdc18f7cb483bfbc8873e7242
                       667e83cf917b2caa16b646e45bfd8c5801fb3b95
                       eaa603076169396bef293ad6c98b7481320111b0
                       bd98689974c0b52807bd97189057d76070b3ec22
                       7c2032206c83d6e3e8a848abaf2b841cd7aff815
                       dca68dba311274d4a063fa88f122d5f3efa7fbe7
                       5402c100585ad78e46c329e231e41162463382fa
                       c72ec44119f8278a0c7df702e84d539f7c91b011
                       674ded6e92538a09e154247a918f3cbc27a4cdb6
                       8746ab7aee40e6a5ce712d56ed3e97a18fcda911
                       2dbcbfe26c680f04522cae1ff43f3d12859205b3
                       b01823f7722dcde7f66f7e6f79bf8cc5f8663142
                       f7648fe2ae9876d2aa74d59f922244064f4cf200
                       d37e59376bc4ba1a595f3a5573c3cdeaf106f5df
                       82002a2d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:1e:68:be:84:de:86:c2:c5:aa:72:5b:11:a7:6c:73:1c:d7:db:89]
            modulus: b63b381173f72a4751c787089930f6cdb4d4c6eaa385d29740fb16bb4e7cf16706b56e59f7aec7d4006ce40194a639760ad2c163a8f003041f8394984f0bf043c58c738400a2d7eebd811498922aaea6f5908ff053006b50ed7e645dbc5827f704df43026866537ee299391fe27a1de633ebf1ac09185223e39813dca7b4aac349e08124352a057e4d18084ccaeea0ee21e8b58b39fb0c0345014b0d13d170ebeee4b240a4b38d310b5fcc8f9bf484b3b17984d8322e74e1b64e074bac22a65a425d23a291eb8896b3b9f973f5d2f662f57f8c806bcdb9f9e4eb491410a52e3893aaf264f842a55dc8c40014d2fc8e7369c2fd90a2b2d0315cda6b33aee0ca99
    public exponent: 10001

]