Results

By type

          2021-09-26 06:16:57,385 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-26 06:16:58,251 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-26 06:16:59.036  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-26 06:17:02.292 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-26 06:17:02.530  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-26 06:17:02.659  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-26 06:17:04.864  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.026 seconds (JVM running for 9.749)
2021-09-26 06:22:31.049  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 06:22:31.065 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 06:22:31.113 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-26 06:22:31.119 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 06:22:31.142  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-26 06:22:31.147  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 06:22:31.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 06:22:31.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 06:22:31.151 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 06:22:31.155 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 06:22:31.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 06:22:31.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 06:22:31.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 06:22:31.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 06:22:31.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 06:22:31.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 06:22:31.861  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 06:22:31.865  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 06:22:31.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 06:22:31.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 06:22:31.879  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 06:22:31.881  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 06:22:31.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 06:22:31.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 06:22:31.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 06:22:31.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 06:22:31.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 06:22:31.899 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 06:22:31.905 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 06:22:31.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 06:22:31.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 06:22:31.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 06:22:31.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [20:9c:e9:f8:c6:83:47:fa:c6:be:71:e8:f0:f9:26:23:84:d8:87:1d]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 08:59:36.743  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 08:59:36.746 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 08:59:36.750 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 08:59:36.751 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 08:59:36.752  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 08:59:36.754  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 08:59:36.755  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 08:59:36.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 08:59:36.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 08:59:36.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 08:59:36.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 08:59:36.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 08:59:36.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 08:59:36.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 08:59:37.031  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 08:59:37.032  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 08:59:37.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 08:59:37.033 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 08:59:37.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 08:59:37.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 08:59:37.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 08:59:37.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 08:59:37.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 08:59:37.046 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 08:59:37.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 08:59:37.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 08:59:37.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 08:59:37.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 08:59:37.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 08:59:37.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 08:59:37.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:52:d9:8e:f0:b6:37:c1:86:94:c5:63:e9:79:21:80:7c:68:a8:4f]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:05:14.454  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:05:14.458 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:05:14.462 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:05:14.463 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:05:14.464  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:05:14.465  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:05:14.465  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:05:14.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:05:14.466 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:05:14.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:05:14.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:05:14.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:05:14.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:05:14.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:05:14.699  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:05:14.700  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:05:14.700 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:05:14.701 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:05:14.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:05:14.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:05:14.705 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:14.705 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:14.705 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:14.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:14.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:14.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:14.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:14.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:14.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:14.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:05:14.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [af:b7:87:37:2a:f4:2e:2f:84:a8:6d:c2:05:07:8b:eb:14:58:30:f3]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:05:47.067  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:05:47.074 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:05:47.077 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:05:47.080 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:05:47.081  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:05:47.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:05:47.082  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:05:47.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:05:47.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:05:47.084 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:05:47.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:05:47.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:05:47.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:05:47.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:05:47.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:05:47.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:05:47.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:05:47.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:05:47.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:05:47.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:05:47.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:47.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:47.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:47.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:47.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:47.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:47.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:05:47.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:05:47.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:05:47.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:05:47.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [80:bd:f2:c8:b6:92:52:50:be:05:0c:d4:95:e4:bd:6e:06:29:0b:8a]
            modulus: 9e86e4cb9ef23cb327fadc6dcfa5ad9d6c92bad8d731beb48d8e8feb0445c5aacc87af1424f5288332a6e863f059845c0d856a4e1a5658c48af9f894da8ce489eff2a717098d9730e7d0a5327479923352ff9602238fe3aaee0b6b999639fac35441f2a991c067cdc5108c2f06268217c0eb026506dcc403da84f5f84a96658bf7c616981c16401bbc195951a45199da791884cb184f2458988d66d51f1b46d27514c165d704af144a0e15e9e64e9a8c4daa294d5d4d28ec73fb14fdc3b2418fdf4d3c863bdcd78dd549ebe712d82f8788d1dc18e12498e5ff524d5a6aecef6baf951b9872d36cc069c6423c109b05e6912a531cbc5c9bb54c0aa2aaeae563dd
    public exponent: 10001

] 
2021-09-26 09:06:19.044  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:06:19.046 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:06:19.047 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:06:19.048 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:06:19.049  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:06:19.050  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:06:19.050  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:06:19.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:06:19.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:06:19.052 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:06:19.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:06:19.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:06:19.061 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:06:19.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:06:19.227  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:06:19.228  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:06:19.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:06:19.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:06:19.232  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:06:19.232  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:06:19.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:19.233 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:19.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:19.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:19.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:19.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:19.236 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:19.236 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:19.237 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:19.238 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:06:19.243 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1d:26:95:24:11:bb:e6:1e:20:cb:85:c9:be:42:fd:06:a6:ee:4a:26]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:06:36.311  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:06:36.326 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:06:36.328 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:06:36.329 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:06:36.330  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:06:36.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:06:36.331  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:06:36.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:06:36.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:06:36.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:06:36.349 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:06:36.351 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:06:36.352 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:06:36.355 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:06:36.492  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:06:36.493  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:06:36.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:06:36.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:06:36.495  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:06:36.496  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:06:36.496 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:36.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:36.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:36.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:36.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:36.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:36.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:06:36.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:06:36.499 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:06:36.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:06:36.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: ae80c137a3d96e97990e7dd45c1b96b3cd4f77485ac8c19f1f675e91a2e78232fb048b9d7223d421f154a6bae930aa5c8ac7958ae895eca4d167c1157bf420602c98e5610deb2783ec773ebb15c6f2d7bddc8f4f8e6f9e6a9b8c0614296d632e3e110460fdde3c25c57d8255af3f643fd560a3081902efadefbc6f79dd1302978f0646f4dd5ee21ed01f46dfaa530fdf79a745dccf3f8953a34adf33aea0977e92cb278bdfb44c0f1433c285e8669ea476913f6de4f40849b4c9de2c98e1aca4cf60da96af40c4f8aeec8c3dff3a4d9059bc2395bbf6104139d0f23789a6ddba37b8f446a5b99dfcbdce140d9f0ce59501c1f66b4d6c1dfc446b8aa807f2aa74c624d7dbb0cc5ad20c4855c3bcd4cfce5cf16515b933360da7aaa6337092b53beb6ed51e9cb3accb31a4bb61b5515d71ad99cd324ac14a461fe634e250435efd6fe08dc409d3428db1eac4a86a3ee05d8ad9e749e299a46b90f624032638bf1301ccb86fc3f009ab448b415b7a01ebafc59cd57b05d4682963705fc7415124ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:6e:d0:d3:51:1f:5a:2d:8f:cc:1b:86:35:65:bf:18:39:34:d9:d5]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:08:25.669  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:08:25.671 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:08:25.674 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:08:25.675 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:08:25.676  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:08:25.678  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:08:25.678  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:08:25.679 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:08:25.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:08:25.680 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:08:25.685 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:08:25.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:08:25.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:08:25.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:08:25.846  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:08:25.847  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:08:25.848 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:08:25.849 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:08:25.851  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:08:25.852  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:08:25.853 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:08:25.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:08:25.854 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:08:25.856 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:08:25.857 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:08:25.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:08:25.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:08:25.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:08:25.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:08:25.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:08:25.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: ae80c137a3d96e97990e7dd45c1b96b3cd4f77485ac8c19f1f675e91a2e78232fb048b9d7223d421f154a6bae930aa5c8ac7958ae895eca4d167c1157bf420602c98e5610deb2783ec773ebb15c6f2d7bddc8f4f8e6f9e6a9b8c0614296d632e3e110460fdde3c25c57d8255af3f643fd560a3081902efadefbc6f79dd1302978f0646f4dd5ee21ed01f46dfaa530fdf79a745dccf3f8953a34adf33aea0977e92cb278bdfb44c0f1433c285e8669ea476913f6de4f40849b4c9de2c98e1aca4cf60da96af40c4f8aeec8c3dff3a4d9059bc2395bbf6104139d0f23789a6ddba37b8f446a5b99dfcbdce140d9f0ce59501c1f66b4d6c1dfc446b8aa807f2aa74c624d7dbb0cc5ad20c4855c3bcd4cfce5cf16515b933360da7aaa6337092b53beb6ed51e9cb3accb31a4bb61b5515d71ad99cd324ac14a461fe634e250435efd6fe08dc409d3428db1eac4a86a3ee05d8ad9e749e299a46b90f624032638bf1301ccb86fc3f009ab448b415b7a01ebafc59cd57b05d4682963705fc7415124ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:bc:80:db:d9:f2:f4:aa:4c:2b:e9:ea:18:31:75:be:9c:7b:c8:c8]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:11:13.883  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:11:13.885 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:11:13.889 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:11:13.891 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:11:13.891  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:11:13.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:11:13.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:11:13.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:11:13.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:11:13.895 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:11:13.900 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:11:13.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:11:13.901 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:11:13.902 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:11:14.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:11:14.136  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:11:14.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:11:14.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:11:14.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:11:14.138  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:11:14.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:11:14.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:11:14.139 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:11:14.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:11:14.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:11:14.141 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:11:14.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:11:14.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:11:14.142 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:11:14.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:11:14.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:f5:45:ff:10:6d:e1:c0:dc:65:22:37:9c:85:4e:65:d9:d4:46:49]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:12:43.577  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:12:43.581 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:12:43.583 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:12:43.585 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:12:43.586  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:12:43.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:12:43.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:12:43.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:12:43.590 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:12:43.591 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:12:43.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:12:43.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:12:43.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:12:43.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:12:43.869  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:12:43.870  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:12:43.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:12:43.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:12:43.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:12:43.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:12:43.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:12:43.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:12:43.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:12:43.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:12:43.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:12:43.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:12:43.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:12:43.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:12:43.877 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:12:43.878 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:12:43.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:eb:50:53:7e:8b:73:de:20:c6:6b:8f:d0:10:14:59:ef:7b:60:55]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:15:29.803  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:15:29.806 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:15:29.809 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:15:29.810 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:15:29.811  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:15:29.812  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:15:29.812  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:15:29.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:15:29.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:15:29.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:15:29.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:15:29.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:15:29.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:15:29.826 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:15:30.020  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:15:30.021  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:15:30.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:15:30.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:15:30.023  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:15:30.024  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:15:30.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:15:30.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:15:30.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:15:30.026 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:15:30.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:15:30.027 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:15:30.028 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:15:30.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:15:30.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:15:30.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:15:30.034 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [db:e5:95:5c:38:9d:8c:03:b9:e4:92:0f:5d:3e:e3:15:bc:6d:3e:ba]
            modulus: f73c4e797759955ff5b8635db91f7eecd656df0a0a18cfbc4ebfb2d34bb2f5c42c79805e398b06d94870cbcf770097773a1d666ebbcbbcc3903058579f2e8c76400a2665a0f1306a95f8a0e56a4db7748ef37764e7a0a36eaebdb8d73ff78c1b39af4e78e10cd176a5a8edef7b42e6e07634a710396aa1866996b5daba4741467489eef047c405207bee920050f599489a03b527fdd1582cdcd0bf8f502b30b9600070929e49cc6c7aadb5e1a0634e0df14be97ddd2ae4f5d84ed9445bb725032739dfa4dbdd2a73993f01c51ef74e74a9ccd261aeea6dea91c7b3927bce10f7faca33256e088cc27ecef729f2bab5f2b417d68231512fa919693871f15548ed
    public exponent: 10001

] 
2021-09-26 09:18:08.106  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:18:08.109 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:18:08.112 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:18:08.113 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:18:08.113  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:18:08.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:18:08.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:18:08.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:18:08.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:18:08.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:18:08.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:18:08.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:18:08.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:18:08.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:18:08.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:18:08.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:18:08.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:18:08.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:18:08.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:18:08.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:18:08.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:08.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:08.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:08.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:08.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:08.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:08.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:08.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:08.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:08.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:18:08.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:cb:42:1f:ab:ed:ca:c1:1d:57:ff:11:7d:8d:5e:9c:73:a7:35:95]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:18:50.710  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:18:50.711 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:18:50.712 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:18:50.714 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:18:50.714  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:18:50.716  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:18:50.716  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:18:50.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:18:50.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:18:50.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:18:50.721 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:18:50.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:18:50.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:18:50.722 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:18:50.925  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:18:50.925  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:18:50.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:18:50.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:18:50.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:18:50.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:18:50.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:50.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:50.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:50.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:50.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:50.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:50.932 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:18:50.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:18:50.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:18:50.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:18:50.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:ec:66:3c:34:60:c5:83:f5:ca:0c:40:fa:5a:e2:3a:db:7a:78:44]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:20:44.517  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:20:44.520 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:20:44.524 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:20:44.526 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:20:44.526  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:20:44.527  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:20:44.527  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:20:44.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:20:44.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:20:44.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:20:44.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:20:44.535 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:20:44.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:20:44.536 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:20:44.730  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:20:44.731  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:20:44.731 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:20:44.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:20:44.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:20:44.733  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:20:44.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:20:44.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:20:44.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:20:44.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:20:44.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:20:44.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:20:44.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:20:44.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:20:44.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:20:44.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:20:44.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ed:d5:8c:d7:c2:7c:bb:f8:d5:51:60:cf:02:cd:66:16:3c:11:d1:36]
            modulus: b7ec02640315084403f8fc3ab1fc6f16acdcdab61e4ccc7d46fe2a3b93173ec89ae1770fe4f15fcc19c17fa42c314370ebc93a4241a396c72f01e6c8f7e4636ff8762a89abb35663cde89c8e9d6ac4ea48353f70faea14030f9c71839f6fcaed890fee4be5064b745aa5d3d13a3659233cc019da65839e7e827084bae51c367bff0ae88acde9e6a5e058927b352e5c1e13eefa920960de51e9e6b0d9b2a9cc3d3b322995fb455931657dff088412125274c8f4b09106bb3ae1533ae05741c86fcc1a54d3e2c2991ffcfe960964a36ef2bbc070275049be999da6947a3302e5750b12fd31b4459136c8ba06f018478cbdaa452739d0c858b9c045d888aadcf473
    public exponent: 10001

] 
2021-09-26 09:22:18.133  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:22:18.135 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:22:18.142 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:22:18.143 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:22:18.144  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:22:18.144  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:22:18.145  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:22:18.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:22:18.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:22:18.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:22:18.151 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:22:18.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:22:18.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:22:18.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:22:18.399  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:22:18.400  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:22:18.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:22:18.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:22:18.402  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:22:18.403  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:22:18.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:18.404 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:18.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:18.409 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:18.409 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:18.410 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:18.412 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:18.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:18.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:18.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:22:18.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:8a:73:7e:65:c6:9f:59:55:47:9d:35:22:2d:6d:1a:dc:99:c5:da]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:22:56.290  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:22:56.292 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:22:56.294 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:22:56.295 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:22:56.296  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:22:56.297  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:22:56.297  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:22:56.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:22:56.298 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:22:56.299 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:22:56.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:22:56.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:22:56.309 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:22:56.310 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:22:56.462  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:22:56.463  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:22:56.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:22:56.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:22:56.465  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:22:56.466  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:22:56.466 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:56.466 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:56.467 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:56.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:56.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:56.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:56.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:22:56.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:22:56.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:22:56.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:22:56.475 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cb:68:c2:e0:91:cd:8b:89:71:a5:a9:93:2a:8b:3d:cb:c6:62:ed:ba]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:23:29.886  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:23:29.888 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:23:29.890 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:23:29.892 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:23:29.893  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:23:29.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:23:29.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:23:29.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:23:29.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:23:29.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:23:29.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:23:29.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:23:29.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:23:29.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:23:30.092  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:23:30.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:23:30.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:23:30.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:23:30.108  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:23:30.109  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:23:30.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:23:30.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:23:30.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:23:30.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:23:30.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:23:30.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:23:30.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:23:30.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:23:30.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:23:30.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:23:30.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [49:68:e3:cf:be:fb:34:92:3b:16:44:95:bd:58:7a:c6:24:ed:5d:54]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:24:05.763  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:24:05.766 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:24:05.768 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:24:05.768 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:24:05.769  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:24:05.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:24:05.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:24:05.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:24:05.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:24:05.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:24:05.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:24:05.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:24:05.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:24:05.783 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:24:05.921  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:24:05.922  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:24:05.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:24:05.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:24:05.923  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:24:05.924  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:24:05.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:24:05.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:24:05.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:24:05.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:24:05.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:24:05.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:24:05.926 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:24:05.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:24:05.927 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:24:05.928 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:24:05.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b3:30:b5:aa:5b:cc:7e:83:21:55:42:59:7a:67:e5:e5:38:51:04:5c]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:25:03.773  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:25:03.775 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:25:03.777 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:25:03.779 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:25:03.779  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:25:03.780  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:25:03.780  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:25:03.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:25:03.781 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:25:03.782 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:25:03.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:25:03.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:25:03.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:25:03.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:25:03.982  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:25:03.983  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:25:03.984 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:25:03.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:25:03.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:25:03.992  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:25:03.993 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:03.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:03.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:03.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:03.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:03.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:03.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:03.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:03.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:03.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:25:04.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:fb:c0:7f:2c:61:25:ae:35:62:97:67:5f:64:2f:f4:2e:bb:91:c5]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:25:51.087  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:25:51.089 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:25:51.092 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:25:51.093 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:25:51.093  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:25:51.094  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:25:51.094  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:25:51.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:25:51.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:25:51.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:25:51.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:25:51.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:25:51.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:25:51.101 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:25:51.256  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:25:51.257  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:25:51.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:25:51.258 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:25:51.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:25:51.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:25:51.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:51.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:51.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:51.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:51.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:51.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:51.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:25:51.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:25:51.273 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:25:51.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:25:51.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:ec:ef:8d:df:9d:f8:d0:1e:3d:b2:35:b8:02:9b:60:fe:32:8b:ec]
            modulus: d09d7f76a1a9ff30ea2098302f34ef9b4f9ce67d9d690590d46b70f360a1c644255e089569d9c4538b0db057e62ae50aaa9b59932a6bf70c43e169cc653eec1ad62b51a8fc4d8819c6f42f32171d386d88f1953565a4750edb509917ac9ab982dd0313c7124088c418e1b69f4e1f72b03711e678738817ba8569a7e0aa173ac729b5f160d48dabeae80f469118328060639aaba78f27b559b0a68b24d9ac9d0b5535671aef4b04ae9cca59c0144b312f2924f97020849b5fd629908bdaa9941fc5f4016ef1b458e070954316679abb6c52c101a078a830e2232923863c857bfb020240afa0aaebbf6ff02f90a63e6799b9ae2c795983e7f92d13e99c79cb8341
    public exponent: 10001

] 
2021-09-26 09:26:28.726  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:26:28.728 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:26:28.729 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:26:28.730 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:26:28.730  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:26:28.731  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:26:28.731  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:26:28.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:26:28.732 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:26:28.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:26:28.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:26:28.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:26:28.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:26:28.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:26:28.882  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:26:28.883  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:26:28.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:26:28.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:26:28.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:26:28.886  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:26:28.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:28.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:28.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:28.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:28.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:28.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:28.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:28.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:28.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:28.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:26:28.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:a2:ba:0c:20:b8:b3:7c:65:b2:c8:5b:84:9b:e9:ee:6b:ec:59:53]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:26:34.778  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:26:34.780 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:26:34.781 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:26:34.781 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:26:34.782  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:26:34.782  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:26:34.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:26:34.783 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:26:34.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:26:34.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:26:34.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:26:34.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:26:34.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:26:34.790 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:26:34.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:26:34.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:26:34.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:26:34.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:26:34.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:26:34.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:26:34.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:34.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:34.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:34.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:34.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:34.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:34.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:26:34.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:26:34.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:26:34.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:26:34.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fa:bc:d9:87:b1:1f:c3:49:53:65:0d:e1:7e:0e:b5:36:96:55:97:08]
            modulus: c7dcee4fda4ead0bd05cffc353ded8515a72926cdd8d0b76f6067c7cec9447995fc517321e28e89f68195f091997c1426fcee9a1e9a13eed3c064ecc3fb1bfcee101ac68cce56ec5625d7ea4806bd809f9269d2367386b324cb724989e6f6152789a63d156e18d0894f32ea8ce7d151a979f4b6504a86c0157473e82f9d4482b4cc08b9831f0406188c7e947e90270d91b6528e9b3cd2b3301b96ae9e9343840cb8f7d20bc6205bf92a3b12a07c6e7a3b9b69c48fb07b43cb33bbb55d97461aef4cd10f83afb18cd3c046bb8ccb6fc5825fff5f67fdbfb374a10cb240946e210bd14cdde60a0312cfcf6636ddf0d9fe9c600b950e1fd97e918f87c3649ec7d77
    public exponent: 10001

] 
2021-09-26 09:28:10.516  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:28:10.521 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:28:10.526 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:28:10.527 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:28:10.528  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-26 09:28:10.529  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:28:10.529  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:28:10.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:28:10.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:28:10.531 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:28:10.536 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:28:10.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:28:10.537 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:28:10.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:28:10.771  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:28:10.771  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:28:10.772 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:28:10.772 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:28:10.773  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:28:10.774  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:28:10.774 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:28:10.775 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:28:10.775 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:28:10.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:28:10.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:28:10.776 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:28:10.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:28:10.777 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:28:10.778 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:28:10.779 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:28:10.783 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e3:53:e9:00:62:d4:d4:57:be:44:c3:09:4a:58:26:d8:5e:ec:86:0a]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:30:36.781  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:30:36.783 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:30:36.785 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:30:36.786 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:30:36.787  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:30:36.787  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:30:36.788  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:30:36.788 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:30:36.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:30:36.789 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:30:36.794 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:30:36.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:30:36.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:30:36.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:30:36.960  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:30:36.961  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:30:36.961 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:30:36.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:30:36.964  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:30:36.965  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:30:36.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:30:36.967 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:30:36.967 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:30:36.968 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:30:36.968 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:30:36.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:30:36.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:30:36.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:30:36.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:30:36.971 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:30:36.974 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:57:fd:71:cc:3d:79:e5:f2:15:61:d9:73:ba:4e:45:fa:eb:1f:b9]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:31:10.271  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:31:10.273 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:31:10.275 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:31:10.275 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:31:10.276  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:31:10.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:31:10.277  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:31:10.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:31:10.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:31:10.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:31:10.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:31:10.282 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:31:10.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:31:10.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:31:10.432  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:31:10.432  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:31:10.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:31:10.433 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:31:10.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:31:10.434  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:31:10.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:10.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:10.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:10.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:10.435 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:10.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:10.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:10.436 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:10.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:10.437 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:31:10.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:84:0f:34:39:2b:56:be:48:95:d0:1e:57:96:4d:ce:76:b1:80:f4]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:31:43.957  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:31:43.959 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:31:43.961 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:31:43.962 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:31:43.962  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:31:43.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:31:43.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:31:43.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:31:43.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:31:43.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:31:43.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:31:43.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:31:43.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:31:43.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:31:44.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:31:44.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:31:44.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:31:44.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:31:44.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:31:44.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:31:44.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:44.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:44.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:44.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:44.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:44.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:44.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:31:44.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:31:44.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:31:44.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:31:44.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: ae80c137a3d96e97990e7dd45c1b96b3cd4f77485ac8c19f1f675e91a2e78232fb048b9d7223d421f154a6bae930aa5c8ac7958ae895eca4d167c1157bf420602c98e5610deb2783ec773ebb15c6f2d7bddc8f4f8e6f9e6a9b8c0614296d632e3e110460fdde3c25c57d8255af3f643fd560a3081902efadefbc6f79dd1302978f0646f4dd5ee21ed01f46dfaa530fdf79a745dccf3f8953a34adf33aea0977e92cb278bdfb44c0f1433c285e8669ea476913f6de4f40849b4c9de2c98e1aca4cf60da96af40c4f8aeec8c3dff3a4d9059bc2395bbf6104139d0f23789a6ddba37b8f446a5b99dfcbdce140d9f0ce59501c1f66b4d6c1dfc446b8aa807f2aa74c624d7dbb0cc5ad20c4855c3bcd4cfce5cf16515b933360da7aaa6337092b53beb6ed51e9cb3accb31a4bb61b5515d71ad99cd324ac14a461fe634e250435efd6fe08dc409d3428db1eac4a86a3ee05d8ad9e749e299a46b90f624032638bf1301ccb86fc3f009ab448b415b7a01ebafc59cd57b05d4682963705fc7415124ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:42:d2:39:3a:c5:6f:2b:9f:20:81:b9:cd:eb:a5:f6:c6:bb:b8:fd]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:34:43.853  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:34:43.855 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:34:43.857 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:34:43.858 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:34:43.858  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-26 09:34:43.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:34:43.859  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:34:43.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:34:43.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:34:43.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:34:43.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:34:43.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:34:43.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:34:43.867 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:34:44.085  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:34:44.086  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:34:44.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:34:44.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:34:44.087  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:34:44.088  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:34:44.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:34:44.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:34:44.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:34:44.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:34:44.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:34:44.090 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:34:44.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:34:44.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:34:44.091 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:34:44.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:34:44.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: ae80c137a3d96e97990e7dd45c1b96b3cd4f77485ac8c19f1f675e91a2e78232fb048b9d7223d421f154a6bae930aa5c8ac7958ae895eca4d167c1157bf420602c98e5610deb2783ec773ebb15c6f2d7bddc8f4f8e6f9e6a9b8c0614296d632e3e110460fdde3c25c57d8255af3f643fd560a3081902efadefbc6f79dd1302978f0646f4dd5ee21ed01f46dfaa530fdf79a745dccf3f8953a34adf33aea0977e92cb278bdfb44c0f1433c285e8669ea476913f6de4f40849b4c9de2c98e1aca4cf60da96af40c4f8aeec8c3dff3a4d9059bc2395bbf6104139d0f23789a6ddba37b8f446a5b99dfcbdce140d9f0ce59501c1f66b4d6c1dfc446b8aa807f2aa74c624d7dbb0cc5ad20c4855c3bcd4cfce5cf16515b933360da7aaa6337092b53beb6ed51e9cb3accb31a4bb61b5515d71ad99cd324ac14a461fe634e250435efd6fe08dc409d3428db1eac4a86a3ee05d8ad9e749e299a46b90f624032638bf1301ccb86fc3f009ab448b415b7a01ebafc59cd57b05d4682963705fc7415124ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bb:31:ec:7c:a7:03:00:b9:50:aa:c8:51:7f:3a:5b:3d:9b:13:a7:7a]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:38:53.831  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:38:53.833 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:38:53.836 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:38:53.837 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:38:53.837  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-26 09:38:53.837  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:38:53.838  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:38:53.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:38:53.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:38:53.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:38:53.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:38:53.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:38:53.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:38:53.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:38:54.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:38:54.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:38:54.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:38:54.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:38:54.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:38:54.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:38:54.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:38:54.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:38:54.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:38:54.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:38:54.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:38:54.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:38:54.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:38:54.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:38:54.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:38:54.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:38:54.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:09:ee:f1:3f:e6:b2:81:fc:bc:05:17:76:34:cb:ee:27:a3:f1:ed]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:39:25.907  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:39:25.909 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:39:25.910 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:39:25.912 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:39:25.912  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-26 09:39:25.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:39:25.913  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:39:25.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:39:25.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:39:25.915 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:39:25.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:39:25.921 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:39:25.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:39:25.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:39:26.110  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:39:26.110  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:39:26.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:39:26.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:39:26.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:39:26.113  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:39:26.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:26.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:26.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:26.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:26.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:26.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:26.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:26.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:26.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:26.118 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:39:26.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:72:46:0c:e2:00:f1:f8:b2:10:69:03:e8:3d:4d:4d:38:f1:a9:d0]
            modulus: d8c21b1976f61265b88ec614f6733823a97e9d74a74b9509d2dfd7a1b1836d8e4b317346279d41caa45fc72cee6d7a3949703a680c1ef6e2313ba75455fcce518f554d4c4f9cb22bdc9168474d85dff093f1fc58f46a5d515ab3809d9ba1199e32618c43d32e6321ee64161dba974d7614a92b72b87b7bff3b84cfcb44f6b84c92e4d0eed1abbae937974d83af2044c82af603bed13e87ad8723fdc5fe72354c18fb2764cc2028a1d26c7c5151bd85c0d38b0e156799286f72223d34fbdcdd7a39d4dd1497f20bf982a893c2ccd594f346f03f104591260ccb7eb9b9cc9292e57e999bcee937f2fb981934eba9b615a97bd4f69ddf097a59ad5c3cbe20af032f
    public exponent: 10001

] 
2021-09-26 09:39:59.655  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:39:59.656 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:39:59.658 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:39:59.658 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:39:59.659  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-26 09:39:59.659  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:39:59.660  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:39:59.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:39:59.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:39:59.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:39:59.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:39:59.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:39:59.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:39:59.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:39:59.882  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:39:59.883  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:39:59.883 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:39:59.884 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:39:59.885  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:39:59.886  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:39:59.886 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:59.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:59.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:59.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:59.889 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:59.890 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:59.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:39:59.891 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:39:59.892 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:39:59.893 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:39:59.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e8:5a:0b:36:04:87:2e:6b:f2:26:e4:4a:7a:7f:cb:b2:d0:4e:50:1a]
            modulus: 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
    public exponent: 10001

] 
2021-09-26 09:41:50.234  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-26 09:41:50.237 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-26 09:41:50.239 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:41:50.240 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-26 09:41:50.240  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-26 09:41:50.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-26 09:41:50.241  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-26 09:41:50.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-26 09:41:50.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-26 09:41:50.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-26 09:41:50.247 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-26 09:41:50.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:41:50.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-26 09:41:50.248 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:41:50.500  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-26 09:41:50.500  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-26 09:41:50.501 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-26 09:41:50.501 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-26 09:41:50.502  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-26 09:41:50.502  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-26 09:41:50.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:41:50.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:41:50.503 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:41:50.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:41:50.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:41:50.504 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:41:50.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-26 09:41:50.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-26 09:41:50.505 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-26 09:41:50.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-26 09:41:50.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 433010158758620642963135656776403922932321000004
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Sep 26 06:14:33 UTC 2021
           Final Date: Fri Sep 26 06:14:32 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [12:2d:55:b6:34:52:3d:61:e2:95:55:a3:ce:8e:03:8b:14:12:b9:ed]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 7372acab64b94a4a8cf8818a7e2cbb17a86bc6e4
                       e88ba8e633c9285730df0398be6558c86156c3cf
                       7df5b3eb28699b1d166e749e93da1ab85944e173
                       43f92b5f1e263b2d1128083314e5fc3a87cc3d4d
                       dc59c0f0b7c597ee5393c954eaa7c7af584e544c
                       f15a754940a1d7f22cbfebc8aac0cb2a576bf979
                       cbdac35bd9e1b2e636981ed133f2e75e936598e9
                       5799bca6c5500984ab3e9cae7a75472721bc8435
                       ddbaf6d658d4b520f2c9d0bb61caec70af1fd8bf
                       d6e8acfb17ad877163bcfdc5bbc99616c33cb8fd
                       b6272ad25e8da7cc190beccb08ceacf14b9f77bc
                       26f7caa5c9cda849cc18d505efbab42e571e9287
                       19df5a42e54ad4cd691f58a7a3c7bc343a70b489
                       cbd89c8142aab0eacbacd53c409db066ccc965ff
                       4bdb9224a8ad41dc76f099c43db3d96fc3fc2309
                       47a5ded5b23e0193aca55c9772673abcccc0fcb8
                       c766b79f928ff251d3557bb78d84942585b74150
                       b55a2e000e60689633e53272957f53d027ab45c7
                       09dc731041493f477baf4e63ee9da78fcd50319a
                       9f329b6f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4f:54:e0:59:ae:6a:0e:d6:d3:07:17:fc:58:ac:5b:91:1d:67:2c:43]
            modulus: da1cbb80d79d39fcb3892b8b3e8ee31fa24522da035d09c5ab9869898fda40008c6c4a101ea7e3643d744c7dd1e02bbe7ea6ade52b0f7c5d8d94aa5e9ccda756f6a85aaa0dd0353a18df45d4b128a2dbe4262b4c2dd4121b84baa5723dd21c1735738302c6d282a4cdb9bc7b91542ad8bc6924540dbb997d3e7b46af9a2a81f5105d6619cac4e0559a8cad799467c56496f9f9ca16bef25ae449a64368495cd8bd518c70b1f9b68d6883e4e55ce02321f1a24537c13fc270fdfa35bb00c62645f9f7d8d17a58f890f00e286e6b9be241c4b7f6e1720456d2bc4e1821c1eba0a85eb0149f7d880af67d73c30734c084044986754db8cf74eac0cc27a8542017f1
    public exponent: 10001

]