Results

By type

          2021-10-15 05:59:50,993 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-15 05:59:51,793 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-15 05:59:52.615  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-15 05:59:55.759 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-15 05:59:56.013  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-15 05:59:56.177  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-15 05:59:58.368  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.053 seconds (JVM running for 9.892)
2021-10-15 06:00:40.409  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 06:00:40.418 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 06:00:40.478 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-15 06:00:40.483 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 06:00:40.508  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-15 06:00:40.514  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 06:00:40.516  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 06:00:40.518 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 06:00:40.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 06:00:40.523 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 06:00:40.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 06:00:40.537 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 06:00:40.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 06:00:40.587 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 06:00:40.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 06:00:40.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 06:00:41.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 06:00:41.344  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 06:00:41.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 06:00:41.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 06:00:41.356  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 06:00:41.357  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 06:00:41.358 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 06:00:41.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 06:00:41.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 06:00:41.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 06:00:41.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 06:00:41.379 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 06:00:41.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 06:00:41.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 06:00:41.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 06:00:41.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 06:00:41.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6a:f7:e0:4a:d8:b6:2f:ea:89:c1:83:e1:2e:07:d6:17:f4:c8:81:31]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:45:28.926  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:45:28.930 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:45:28.934 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 08:45:28.935 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:45:28.936  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 08:45:28.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:45:28.937  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:45:28.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:45:28.938 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:45:28.939 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:45:28.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:45:28.952 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:45:28.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:45:28.953 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:45:29.175  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:45:29.177  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:45:29.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:45:29.178 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:45:29.181  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:45:29.181  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:45:29.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:45:29.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:45:29.183 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:45:29.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:45:29.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:45:29.184 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:45:29.185 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:45:29.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:45:29.186 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:45:29.187 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:45:29.193 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:f5:b1:b0:cd:59:ff:60:6b:2e:37:52:8d:f9:23:ab:39:00:7f:9a]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:50:17.215  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:50:17.219 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:50:17.223 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 08:50:17.224 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:50:17.226  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 08:50:17.227  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:50:17.228  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:50:17.229 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:50:17.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:50:17.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:50:17.249 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:50:17.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:50:17.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:50:17.250 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:50:17.393  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:50:17.393  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:50:17.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:50:17.394 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:50:17.396  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:50:17.397  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:50:17.398 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:17.398 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:17.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:17.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:17.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:17.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:17.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:17.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:17.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:17.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:50:17.408 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:c8:d9:b9:24:7e:b1:35:9f:82:c9:06:95:35:ed:85:c7:d1:3b:47]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:50:49.280  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:50:49.282 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:50:49.286 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-15 08:50:49.287 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:50:49.288  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-15 08:50:49.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:50:49.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:50:49.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:50:49.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:50:49.292 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:50:49.303 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:50:49.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:50:49.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:50:49.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:50:49.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:50:49.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:50:49.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:50:49.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:50:49.474  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:50:49.475  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:50:49.475 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:49.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:49.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:49.477 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:49.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:49.482 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:50:49.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:50:49.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:50:49.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:50:49.505 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: ded380bd341d276f9b600755fd517f6c1e9db77860003bd553f9b88f55526404709af5f7c28f2de199c52f12b676ff1533faba1a5c0e28db5b58fb7eb7fa5e8fe01a2274d8c63127e2c8601b6b5daab0f19d3e8d7bf629145a65271629984b625be629f1b2d5da4e7fa13d18f8045b00af732712c4bcb7743db33882247b7b2a05317f3d4f982772ddcea2272c97af5c08a405be01ea09ed0dc9c2e942dd16bc84e530158e79209fdf72975efca31a2cf6a001cde35b47819ee180c35f1e7f1d600df4ce00e6e40aad9cfaf55d82c53abf64ea2f0851cdb931044d2c4579af1fdf8ac1f810f1a9a8a4f97a5e40612e51f6d324c61e5eb82310d96f1024d6b260eeda047dd090b2a738caea0899c2c5ea32795dca85d1aab5015acbc3f5dbd32f8db05599233deee2da00d9d92ad4fbb69e8c57e0aedc9963314027d7b884075b255dd4bca0173a4750470558295c4dd65fd2ee39eb2ca4ca9c58351fc770828216855395623aedfec1a4bdae26d4b9ff446a02234373adfa31808b8da8f28063
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [61:3c:d0:62:55:5e:58:0c:8c:d5:79:72:16:cc:50:3f:78:25:ed:e6]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:51:22.793  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:51:22.795 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:51:22.798 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-15 08:51:22.799 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:51:22.800  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-15 08:51:22.801  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:51:22.801  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:51:22.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:51:22.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:51:22.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:51:22.810 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:51:22.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:51:22.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:51:22.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:51:23.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:51:23.023  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:51:23.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:51:23.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:51:23.028  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:51:23.029  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:51:23.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:51:23.039 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:51:23.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:51:23.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:51:23.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:51:23.042 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:51:23.043 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:51:23.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:51:23.044 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:51:23.045 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:51:23.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: ded380bd341d276f9b600755fd517f6c1e9db77860003bd553f9b88f55526404709af5f7c28f2de199c52f12b676ff1533faba1a5c0e28db5b58fb7eb7fa5e8fe01a2274d8c63127e2c8601b6b5daab0f19d3e8d7bf629145a65271629984b625be629f1b2d5da4e7fa13d18f8045b00af732712c4bcb7743db33882247b7b2a05317f3d4f982772ddcea2272c97af5c08a405be01ea09ed0dc9c2e942dd16bc84e530158e79209fdf72975efca31a2cf6a001cde35b47819ee180c35f1e7f1d600df4ce00e6e40aad9cfaf55d82c53abf64ea2f0851cdb931044d2c4579af1fdf8ac1f810f1a9a8a4f97a5e40612e51f6d324c61e5eb82310d96f1024d6b260eeda047dd090b2a738caea0899c2c5ea32795dca85d1aab5015acbc3f5dbd32f8db05599233deee2da00d9d92ad4fbb69e8c57e0aedc9963314027d7b884075b255dd4bca0173a4750470558295c4dd65fd2ee39eb2ca4ca9c58351fc770828216855395623aedfec1a4bdae26d4b9ff446a02234373adfa31808b8da8f28063
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b2:84:6f:f4:1a:52:43:53:02:11:64:a3:c5:11:3f:98:b3:3b:dd:8e]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:53:08.254  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:53:08.257 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:53:08.259 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 08:53:08.260 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:53:08.261  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 08:53:08.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:53:08.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:53:08.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:53:08.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:53:08.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:53:08.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:53:08.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:53:08.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:53:08.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:53:08.484  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:53:08.486  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:53:08.486 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:53:08.487 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:53:08.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:53:08.490  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:53:08.493 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:08.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:08.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:08.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:08.503 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:08.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:08.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:08.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:08.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:08.508 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:53:08.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:d1:f7:c9:c1:e9:a0:24:de:0b:49:c8:4d:19:58:9a:8b:30:bc:01]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:53:50.931  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:53:50.933 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:53:50.937 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 08:53:50.938 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:53:50.939  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 08:53:50.939  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:53:50.939  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:53:50.940 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:53:50.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:53:50.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:53:50.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:53:50.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:53:50.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:53:50.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:53:51.136  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:53:51.138  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:53:51.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:53:51.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:53:51.141  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:53:51.142  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:53:51.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:51.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:51.143 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:51.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:51.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:51.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:51.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:53:51.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:53:51.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:53:51.147 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:53:51.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:c9:6c:34:56:77:19:c2:19:6e:f0:99:cf:b4:fa:75:a7:ec:90:30]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 08:55:02.426  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:55:02.428 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:55:02.431 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 08:55:02.432 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:55:02.433  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 08:55:02.433  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:55:02.434  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:55:02.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:55:02.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:55:02.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:55:02.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:55:02.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:55:02.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:55:02.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:55:02.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:55:02.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:55:02.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:55:02.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:55:02.631  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:55:02.632  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:55:02.633 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:55:02.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:55:02.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:55:02.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:55:02.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:55:02.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:55:02.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:55:02.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:55:02.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:55:02.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:55:02.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:b4:ad:bd:a1:be:e6:ad:17:29:1e:0e:3f:b0:ca:5b:13:bb:f3:d9]
            modulus: e422d4713a1a32510d22c1242346e769adea15141389122357292baa57f0727f353f94296c46fe6c57e6a426724019cb1f89ac165a53fe40ddda9a336b5c9132246a418335db5aed785eacae81969e369233859288615f22c58dcfb03e386dec5c3d0980efff4a2390828c4d7689532244ab855120b5764d2da4acee0740caee39a4b12ec62c6e99f15822b935f8dd370e2b24202098add328d08b0354c29eb982137fc3f7775062a5c2afcf713f37aae3ee04acd71ccb44978132adda54e3dbdd5c0693c1b23d88ad182582b6a3bcd10992d4e119242e9a0a06587f3a7f0daadd1c203f27fe5cb3a7b9bf0098a8261c5253ac726df15ec92ec0743a959930a1
    public exponent: 10001

] 
2021-10-15 08:56:38.329  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 08:56:38.341 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 08:56:38.349 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 08:56:38.350 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 08:56:38.351  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 08:56:38.352  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 08:56:38.352  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 08:56:38.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 08:56:38.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 08:56:38.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 08:56:38.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 08:56:38.380 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:56:38.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 08:56:38.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:56:38.609  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 08:56:38.609  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 08:56:38.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 08:56:38.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 08:56:38.612  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 08:56:38.612  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 08:56:38.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:56:38.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:56:38.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:56:38.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:56:38.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:56:38.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:56:38.615 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 08:56:38.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 08:56:38.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 08:56:38.619 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 08:56:38.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 51450110465184961711826269334162104219969771147
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 05:56:27 UTC 2021
           Final Date: Wed Oct 15 05:56:26 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [5a:2d:59:51:58:5d:da:38:d3:12:6c:be:5a:ae:be:91:8a:23:91:c2]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: b33c10bf94e08ae2e1b294332663e365eeab5968
                       384a8ef149ccb639cacd7ba7a40152a37bc6f35e
                       fa52bc666cf24e818de4cf4b3cf7ec2f47381615
                       9bbea1570d9807729e6045e306e4fde203f2a6d6
                       f3da9a8cefd115057a2c1ca0a72ac055aa60ec51
                       578bef222479feef446bf54e20a51716607bdde0
                       db7c00c8d0689155f84b55fc17aece93b9e72e70
                       0511a5c7d79bd088e5d3b2cd682ca7ebd60309b5
                       0f9a224df32d3f3f31452fbac1458aecafb5df6d
                       147b335359a9b8211a2d2d2e7e94a6c2a764b97e
                       6730629e0762e979fd272d5053b003305861ca42
                       4ffedd7f287d0dd54f2d5e609e544e2c788312fc
                       9be8ef88e650bffc2af5c536aa8d2b74c8f9320e
                       6ee73c50cab49706b839ea91d09d54d1ba812af3
                       e4eaa998a91a9d83b891ee7478180773ee0c6277
                       625edaf07ffb51cfb16d0f6e8aa4d5e672f77b16
                       e8a283d712b49e1329cda5ecde90e0bcd95f07d7
                       04fd6fd36e0e436b182ff1229bc1a33dfe0788e7
                       b19353e22e2241b5f43fa10d420548afe348a7a0
                       a5c84b6c
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6c:15:bb:ca:17:5d:a6:09:59:de:78:9f:6d:24:fa:12:99:cc:4f:39]
            modulus: 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
    public exponent: 10001

]