Results

By type

          2021-09-30 06:03:39,723 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-30 06:03:40,585 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-30 06:03:41.405  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-30 06:03:44.367 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-30 06:03:44.600  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-30 06:03:44.754  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-30 06:03:47.087  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.984 seconds (JVM running for 10.044)
2021-09-30 06:07:08.215  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 06:07:08.228 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 06:07:08.279 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-30 06:07:08.289 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 06:07:08.314  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-30 06:07:08.320  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 06:07:08.322  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 06:07:08.324 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 06:07:08.325 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 06:07:08.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 06:07:08.338 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 06:07:08.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 06:07:08.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 06:07:08.404 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 06:07:08.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 06:07:08.412 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 06:07:09.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 06:07:09.077  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 06:07:09.077 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 06:07:09.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 06:07:09.090  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 06:07:09.091  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 06:07:09.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 06:07:09.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 06:07:09.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 06:07:09.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 06:07:09.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 06:07:09.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 06:07:09.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 06:07:09.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 06:07:09.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 06:07:09.116 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 06:07:09.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8a:70:f7:b3:85:64:ae:81:41:ec:2f:cb:7c:6a:66:6a:69:c3:a1:e3]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:27:51.613  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:27:51.616 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:27:51.619 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 08:27:51.620 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:27:51.621  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 08:27:51.622  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:27:51.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:27:51.623 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:27:51.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:27:51.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:27:51.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:27:51.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:27:51.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:27:51.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:27:51.910  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:27:51.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:27:51.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:27:51.912 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:27:51.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:27:51.917  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:27:51.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:27:51.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:27:51.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:27:51.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:27:51.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:27:51.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:27:51.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:27:51.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:27:51.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:27:51.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:27:51.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: a36336386d5ceb7f2e309bf8aa8a14936c0bb1f700afb13cc3327b2e776fd8db0104c974cbfd9b086fa2180b86ee9e8c77ec658b2e9cdb9456415d3059b880777616c34734055331028e908264d29a6f8dc6aa71a524085043cc8a7b9e9c72baf455a40047c978a78d0de055518e8fb07959e4279f7e65a41a056f1383893b047cd9321719d790499fd882075b62c810cf9c67784db7b79f8e4198e173ffe23198470eb404860aaec8c0add14c19122ba72e0c7043c9def0a935a2cff4b93269a719dcf74783e8eb47c419248430e6a5d2c5d562ac7ed1bf1631542fa79770c0dfc294dd24303d5c6b65a7e643d7e14056dec30c7f85a831416f360887eae27a1ae946f8f46f7403a950217d4ab2fa0bbbb6f06d5868900253136552f28be7e1dda0bf162aab8f8d88ca21c8bf02a2ad278d13ced449bbc6da027a2dd2ca2ef7d3e2411c760e594bbd83bff96b18c717d82293d5a92767cd9387f1f1897e7f2cb4795e961d2723df33e1210bb392822a58cbade09a2f397ae634d75a85298511
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:16:00:f7:0e:42:4a:20:92:2f:ae:77:a9:65:66:45:1b:4e:06:dd]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:32:37.933  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:32:37.938 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:32:37.942 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:32:37.944 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:32:37.945  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:32:37.946  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:32:37.946  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:32:37.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:32:37.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:32:37.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:32:37.961 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:32:37.962 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:32:37.963 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:32:37.963 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:32:38.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:32:38.124  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:32:38.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:32:38.125 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:32:38.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:32:38.128  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:32:38.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:32:38.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:32:38.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:32:38.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:32:38.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:32:38.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:32:38.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:32:38.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:32:38.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:32:38.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:32:38.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: a36336386d5ceb7f2e309bf8aa8a14936c0bb1f700afb13cc3327b2e776fd8db0104c974cbfd9b086fa2180b86ee9e8c77ec658b2e9cdb9456415d3059b880777616c34734055331028e908264d29a6f8dc6aa71a524085043cc8a7b9e9c72baf455a40047c978a78d0de055518e8fb07959e4279f7e65a41a056f1383893b047cd9321719d790499fd882075b62c810cf9c67784db7b79f8e4198e173ffe23198470eb404860aaec8c0add14c19122ba72e0c7043c9def0a935a2cff4b93269a719dcf74783e8eb47c419248430e6a5d2c5d562ac7ed1bf1631542fa79770c0dfc294dd24303d5c6b65a7e643d7e14056dec30c7f85a831416f360887eae27a1ae946f8f46f7403a950217d4ab2fa0bbbb6f06d5868900253136552f28be7e1dda0bf162aab8f8d88ca21c8bf02a2ad278d13ced449bbc6da027a2dd2ca2ef7d3e2411c760e594bbd83bff96b18c717d82293d5a92767cd9387f1f1897e7f2cb4795e961d2723df33e1210bb392822a58cbade09a2f397ae634d75a85298511
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:93:00:2f:54:97:00:9b:fe:e9:dd:ef:b4:4c:86:91:29:11:be:26]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:33:09.367  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:33:09.368 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:33:09.370 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 08:33:09.370 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:33:09.375  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 08:33:09.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:33:09.377  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:33:09.385 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:33:09.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:33:09.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:33:09.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:33:09.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:33:09.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:33:09.405 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:33:09.594  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:33:09.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:33:09.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:33:09.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:33:09.598  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:33:09.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:33:09.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:09.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:09.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:09.601 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:09.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:09.602 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:09.603 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:09.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:09.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:09.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:33:09.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:15:9d:78:4a:d1:09:e4:c2:c0:cb:11:36:94:2c:67:04:2f:97:14]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:33:44.865  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:33:44.869 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:33:44.871 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 08:33:44.872 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:33:44.873  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 08:33:44.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:33:44.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:33:44.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:33:44.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:33:44.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:33:44.882 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:33:44.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:33:44.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:33:44.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:33:45.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:33:45.042  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:33:45.042 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:33:45.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:33:45.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:33:45.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:33:45.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:45.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:45.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:45.054 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:45.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:45.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:45.058 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:33:45.059 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:33:45.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:33:45.062 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:33:45.068 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [29:37:e7:23:6c:a9:16:7b:dd:7b:1f:1c:d6:f5:65:80:0d:20:76:14]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:35:22.133  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:35:22.139 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:35:22.142 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:35:22.144 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:35:22.145  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:35:22.145  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:35:22.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:35:22.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:35:22.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:35:22.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:35:22.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:35:22.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:35:22.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:35:22.157 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:35:22.350  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:35:22.351  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:35:22.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:35:22.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:35:22.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:35:22.355  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:35:22.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:35:22.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:35:22.356 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:35:22.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:35:22.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:35:22.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:35:22.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:35:22.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:35:22.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:35:22.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:35:22.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a8:e4:5c:d0:d5:a9:86:50:cb:72:bb:f6:7f:32:f0:b2:8b:b3:24:90]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:36:36.402  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:36:36.406 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:36:36.409 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:36:36.410 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:36:36.413  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:36:36.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:36:36.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:36:36.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:36:36.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:36:36.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:36:36.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:36:36.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:36:36.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:36:36.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:36:36.568  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:36:36.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:36:36.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:36:36.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:36:36.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:36:36.571  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:36:36.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:36.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:36.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:36.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:36.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:36.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:36.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:36.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:36.581 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:36.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:36:36.588 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:28:5e:91:81:cd:9b:f2:8a:27:f1:3b:be:0e:56:a2:6d:f2:0a:99]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:36:53.734  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:36:53.736 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:36:53.739 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:36:53.740 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:36:53.741  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:36:53.742  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:36:53.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:36:53.743 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:36:53.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:36:53.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:36:53.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:36:53.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:36:53.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:36:53.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:36:53.867  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:36:53.867  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:36:53.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:36:53.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:36:53.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:36:53.870  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:36:53.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:53.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:53.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:53.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:53.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:53.873 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:53.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:36:53.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:36:53.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:36:53.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:36:53.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5e:44:69:f6:d7:41:09:d1:7b:af:c4:47:66:f1:7f:77:a6:ac:d0:b6]
            modulus: bad9bddf77d7643a5111d8b1e1cb7e41a7485ec0d68a27824943bcdcf4cfe0fe30bbc33f3b7b9a1383977d99ff353f95e0f7eb6f5dbf25cb50c6d65dd40b6d3631a454b3edba422de2cbc6dc7c65d49524155692d0f398ff624084b0374799c31cea774bdc9b4267a09fa838da3dd6be75277374dfd60aa30b260d87c85a2484b963df3934b1e876614f14a1f7715824219574e087909d9202e15db75dd6ae8011b73850680b6f9b9e42a49d1e42923b13f229e8fa43320d0c5aeba4ea38e3bab542516eb171bdb7d0d4bbeb33cccab813ebb9e87a4ea7f3434679d0e6bda09c30c37743408c0bbb8cae7031711a72fc67ef3c4dd71e6090f18008ff962a6a81
    public exponent: 10001

] 
2021-09-30 08:38:48.138  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:38:48.142 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:38:48.149 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-30 08:38:48.151 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:38:48.151  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-30 08:38:48.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:38:48.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:38:48.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:38:48.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:38:48.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:38:48.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:38:48.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:38:48.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:38:48.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:38:48.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:38:48.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:38:48.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:38:48.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:38:48.367  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:38:48.368  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:38:48.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:38:48.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:38:48.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:38:48.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:38:48.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:38:48.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:38:48.370 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:38:48.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:38:48.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:38:48.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:38:48.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: a36336386d5ceb7f2e309bf8aa8a14936c0bb1f700afb13cc3327b2e776fd8db0104c974cbfd9b086fa2180b86ee9e8c77ec658b2e9cdb9456415d3059b880777616c34734055331028e908264d29a6f8dc6aa71a524085043cc8a7b9e9c72baf455a40047c978a78d0de055518e8fb07959e4279f7e65a41a056f1383893b047cd9321719d790499fd882075b62c810cf9c67784db7b79f8e4198e173ffe23198470eb404860aaec8c0add14c19122ba72e0c7043c9def0a935a2cff4b93269a719dcf74783e8eb47c419248430e6a5d2c5d562ac7ed1bf1631542fa79770c0dfc294dd24303d5c6b65a7e643d7e14056dec30c7f85a831416f360887eae27a1ae946f8f46f7403a950217d4ab2fa0bbbb6f06d5868900253136552f28be7e1dda0bf162aab8f8d88ca21c8bf02a2ad278d13ced449bbc6da027a2dd2ca2ef7d3e2411c760e594bbd83bff96b18c717d82293d5a92767cd9387f1f1897e7f2cb4795e961d2723df33e1210bb392822a58cbade09a2f397ae634d75a85298511
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:74:24:bd:e7:42:d2:14:e0:8e:53:d2:a3:35:a1:c4:3a:4a:ed:9d]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:49:21.362  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:49:21.366 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:49:21.369 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 08:49:21.371 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:49:21.371  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-30 08:49:21.372  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:49:21.373  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:49:21.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:49:21.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:49:21.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:49:21.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:49:21.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:49:21.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:49:21.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:49:21.561  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:49:21.562  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:49:21.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:49:21.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:49:21.564  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:49:21.565  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:49:21.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:49:21.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:49:21.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:49:21.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:49:21.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:49:21.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:49:21.572 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:49:21.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:49:21.573 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:49:21.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:49:21.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [62:0e:1b:a6:69:f2:1b:b4:7c:4d:8b:7e:01:6e:fa:8a:2f:95:a4:2c]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:53:33.227  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:53:33.229 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:53:33.231 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:53:33.232 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:53:33.233  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-30 08:53:33.233  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:53:33.234  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:53:33.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:53:33.234 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:53:33.235 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:53:33.241 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:53:33.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:53:33.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:53:33.242 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:53:33.411  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:53:33.412  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:53:33.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:53:33.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:53:33.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:53:33.414  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:53:33.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:53:33.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:53:33.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:53:33.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:53:33.416 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:53:33.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:53:33.417 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:53:33.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:53:33.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:53:33.419 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:53:33.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fe:46:57:86:37:6c:b7:a0:53:fb:1b:ad:26:d1:cc:0a:61:c1:47:2c]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:54:04.752  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:54:04.754 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:54:04.756 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 08:54:04.757 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:54:04.758  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-30 08:54:04.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:54:04.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:54:04.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:54:04.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:54:04.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:54:04.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:54:04.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:54:04.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:54:04.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:54:04.966  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:54:04.967  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:54:04.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:54:04.967 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:54:04.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:54:04.970  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:54:04.970 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:04.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:04.971 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:04.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:04.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:04.972 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:04.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:04.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:04.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:04.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:54:04.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:96:86:f3:6b:f9:02:5e:7e:59:e2:c8:5a:40:e1:7a:d9:9b:51:c4]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:54:41.961  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:54:41.962 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:54:41.967 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 08:54:41.967 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:54:41.968  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-30 08:54:41.968  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:54:41.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:54:41.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:54:41.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:54:41.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:54:41.974 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:54:41.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:54:41.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:54:41.975 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:54:42.172  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:54:42.173  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:54:42.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:54:42.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:54:42.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:54:42.176  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:54:42.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:42.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:42.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:42.177 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:42.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:42.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:42.178 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:54:42.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:54:42.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:54:42.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:54:42.183 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:22:7c:40:21:1e:30:15:f1:25:54:c8:ec:02:c4:83:62:84:ba:3c]
            modulus: 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
    public exponent: 10001

] 
2021-09-30 08:56:49.538  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-30 08:56:49.542 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-30 08:56:49.546 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:56:49.547 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-30 08:56:49.548  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-30 08:56:49.549  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-30 08:56:49.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-30 08:56:49.551 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-30 08:56:49.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-30 08:56:49.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-30 08:56:49.562 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-30 08:56:49.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:56:49.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-30 08:56:49.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:56:49.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-30 08:56:49.722  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-30 08:56:49.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-30 08:56:49.723 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-30 08:56:49.725  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-30 08:56:49.725  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-30 08:56:49.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:56:49.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:56:49.726 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:56:49.727 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:56:49.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:56:49.728 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:56:49.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-30 08:56:49.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-30 08:56:49.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-30 08:56:49.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-30 08:56:49.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 130996151834639706142706432286939578307424049177
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Sep 30 06:01:23 UTC 2021
           Final Date: Tue Sep 30 06:01:22 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [61:82:88:95:c4:2c:84:62:0e:05:46:d3:13:45:37:43:31:0f:47:74]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 14569d780b0e5b2990e58a4c9b12d77b29229ae0
                       316b37f15d39b950068bbbb338bee817e9bb4483
                       93082cfee784f5c19cfb584fe70d760522349dc7
                       fbef7707e4b6ab9f5a58ee590e09d8e597889ae9
                       46dfdc3a8d6d1c72beff82d65a1afe55ee3236cb
                       3b33767b1c2a80e1f7301fbe055ee6863ab6996e
                       901e48f3d22c8edd09eac7f17b5db0b29f55f019
                       0411340eb95c90658521dfb73427278ec29f5a95
                       8daf917ccfb97a3f2bc30217aa25d502a2983e15
                       f74cc194a4e4b4aa635a0a75cd1056d42a835b80
                       45d3651107c016b1af30969fe1381ad0f66d547c
                       ae652014703e0a03ff34ecf71bbebe207cd85d30
                       71e676ce8cab1eb1647de1dbc9a1e947eee6b669
                       938b6eda897570d8c465c1d922522ae799f108a9
                       5f0e91f18bd1fcc371c1aa3abf541d6f0fede10f
                       1df3855395a8c64b67cf208b67a95194f2d18171
                       d16f84b8084190e4d7563237de0d67d280b9305f
                       ba89b3843be0d8e4f61b84a2b93915383928a5ff
                       31910b01bb231ded80f3c88fcf8c91491de8366e
                       31b07bc7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8c:08:ce:c0:ae:b8:90:32:0d:46:0d:98:34:ba:90:62:44:f1:d0:30]
            modulus: 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
    public exponent: 10001

]