Results

By type

          2021-11-03 16:56:16,663 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-03 16:56:17,541 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-03 16:56:18.289  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-03 16:56:21.140 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-03 16:56:21.431  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-03 16:56:21.574  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-03 16:56:23.639  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.559 seconds (JVM running for 9.376)
2021-11-03 17:01:39.650  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 17:01:39.662 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 17:01:39.710 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-03 17:01:39.715 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 17:01:39.735  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-03 17:01:39.738  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 17:01:39.739  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 17:01:39.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 17:01:39.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 17:01:39.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 17:01:39.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 17:01:39.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 17:01:39.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 17:01:39.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 17:01:39.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 17:01:39.809 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 17:01:40.387  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 17:01:40.391  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 17:01:40.391 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 17:01:40.393 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 17:01:40.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 17:01:40.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 17:01:40.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 17:01:40.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 17:01:40.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 17:01:40.423 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 17:01:40.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 17:01:40.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 17:01:40.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 17:01:40.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 17:01:40.432 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 17:01:40.434 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 17:01:40.467 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:75:8c:b1:89:87:de:72:e9:45:f4:d1:ae:00:89:7b:cd:ea:d1:a4]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:09:13.802  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:09:13.806 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:09:13.811 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:09:13.815 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:09:13.820  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:09:13.822  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:09:13.823  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:09:13.824 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:09:13.825 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:09:13.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:09:13.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:09:13.845 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:09:13.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:09:13.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:09:14.029  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:09:14.031  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:09:14.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:09:14.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:09:14.038  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:09:14.039  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:09:14.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:09:14.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:09:14.040 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:09:14.041 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:09:14.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:09:14.042 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:09:14.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:09:14.043 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:09:14.044 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:09:14.045 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:09:14.050 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:ec:00:df:8e:d4:6d:f2:38:10:72:f5:ef:83:a3:6d:88:f8:f4:44]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:10:43.413  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:10:43.415 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:10:43.418 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:10:43.419 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:10:43.420  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:10:43.423  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:10:43.424  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:10:43.424 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:10:43.425 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:10:43.426 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:10:43.437 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:10:43.438 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:10:43.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:10:43.439 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:10:43.645  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:10:43.646  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:10:43.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:10:43.647 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:10:43.649  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:10:43.650  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:10:43.650 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:10:43.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:10:43.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:10:43.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:10:43.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:10:43.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:10:43.654 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:10:43.654 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:10:43.655 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:10:43.656 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:10:43.660 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: a43d413eedfc2fbe8737d1cd7b59f71ec18b1f353eb948c6c80bb14676a9f0176e13ada444f6218520acf1423439dd87e4b9c9a0c78863650bdbd8345dd37cdf92241d1eac03067efea3756c151c430879ed378448ad2963ce0e7865145bfde0b58a2bbbcc843669ac9be27c545a09b582dac8ba95a11f0e4c8fa5e0965ac089365d6ac9f1629bc7a9d379e7bc1d04928c1726475199ece3cd8e9d388828b14250617808fc6e78583da9ddf25c3d6695049e01af1424aaaa8a2624790d0ec60fc57f458918bb125e0a0d8af9d4da40c94d15b39dbe732c2b948996e3d79881a424504a4c2a842c86827432667204aeaa8cbc9dea1f1bc53bfb09aa20e3fd53bd0285b7b5080f60b60336f70048c5684e64d862e8ae4c8505b30159a1372509c943598afa7dfdf0f0885f00e5a9391c08c373c922c52542247536f9a38bbde247174a8f80ec6ef3b173484a6ea0f2b6e166d98b44c0305c9198e39032710728e45caaa6e5ecb8696dc32b240861e26246e59d999fa319791a176990d876190adb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:1f:be:06:1d:2a:b4:bd:45:6a:1c:73:28:f7:de:ff:94:a2:df:24]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:14:41.251  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:14:41.254 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:14:41.256 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:14:41.257 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:14:41.258  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:14:41.259  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:14:41.259  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:14:41.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:14:41.260 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:14:41.261 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:14:41.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:14:41.271 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:14:41.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:14:41.272 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:14:41.481  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:14:41.482  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:14:41.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:14:41.483 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:14:41.485  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:14:41.485  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:14:41.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:14:41.486 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:14:41.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:14:41.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:14:41.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:14:41.489 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:14:41.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:14:41.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:14:41.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:14:41.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:14:41.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:69:34:bf:d9:20:32:2d:1a:a6:cb:4a:66:e4:af:e3:c8:70:d6:8f]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:17:28.586  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:17:28.591 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:17:28.595 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:17:28.596 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:17:28.597  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:17:28.599  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:17:28.599  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:17:28.600 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:17:28.601 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:17:28.602 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:17:28.610 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:17:28.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:17:28.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:17:28.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:17:28.843  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:17:28.844  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:17:28.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:17:28.845 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:17:28.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:17:28.850  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:17:28.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:17:28.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:17:28.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:17:28.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:17:28.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:17:28.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:17:28.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:17:28.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:17:28.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:17:28.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:17:28.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [27:28:5d:27:c2:af:0b:ab:fb:15:27:d8:17:e4:d0:8b:29:e8:ef:8b]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:19:16.457  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:19:16.459 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:19:16.461 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-03 20:19:16.462 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:19:16.463  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-03 20:19:16.463  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:19:16.464  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:19:16.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:19:16.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:19:16.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:19:16.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:19:16.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:19:16.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:19:16.473 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:19:16.644  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:19:16.645  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:19:16.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:19:16.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:19:16.648  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:19:16.648  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:19:16.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:19:16.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:19:16.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:19:16.650 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:19:16.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:19:16.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:19:16.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:19:16.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:19:16.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:19:16.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:19:16.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:d0:91:e9:5d:e8:f5:95:1e:d7:ea:e5:81:bb:5d:e0:aa:01:0c:f9]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:23:12.197  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:23:12.201 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:23:12.205 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:23:12.206 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:23:12.207  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:23:12.208  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:23:12.208  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:23:12.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:23:12.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:23:12.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:23:12.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:23:12.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:23:12.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:23:12.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:23:12.379  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:23:12.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:23:12.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:23:12.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:23:12.384  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:23:12.384  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:23:12.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:12.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:12.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:12.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:12.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:12.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:12.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:12.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:12.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:12.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:23:12.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:08:21:74:25:2a:74:e9:4f:6d:7d:b8:93:c7:59:00:a7:d7:89:31]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:23:43.663  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:23:43.667 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:23:43.670 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:23:43.672 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:23:43.672  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:23:43.673  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:23:43.674  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:23:43.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:23:43.675 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:23:43.675 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:23:43.680 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:23:43.681 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:23:43.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:23:43.682 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:23:43.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:23:43.884  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:23:43.884 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:23:43.885 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:23:43.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:23:43.887  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:23:43.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:43.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:43.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:43.888 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:43.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:43.889 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:43.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:23:43.890 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:23:43.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:23:43.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:23:43.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:ca:56:9e:2a:4e:33:9c:a7:67:f2:50:a1:bf:6a:bf:4c:65:ff:9b]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:24:19.141  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:24:19.145 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:24:19.148 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:24:19.149 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:24:19.150  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:24:19.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:24:19.152  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:24:19.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:24:19.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:24:19.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:24:19.160 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:24:19.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:24:19.161 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:24:19.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:24:19.360  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:24:19.361  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:24:19.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:24:19.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:24:19.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:24:19.363  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:24:19.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:24:19.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:24:19.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:24:19.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:24:19.365 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:24:19.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:24:19.366 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:24:19.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:24:19.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:24:19.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:24:19.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:1d:8a:0b:5d:a9:66:0e:85:4c:c3:c3:0c:50:dc:98:42:bc:73:2a]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:27:07.232  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:27:07.235 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:27:07.237 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:27:07.238 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:27:07.239  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:27:07.239  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:27:07.240  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:27:07.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:27:07.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:27:07.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:27:07.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:27:07.247 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:27:07.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:27:07.248 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:27:07.430  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:27:07.431  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:27:07.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:27:07.431 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:27:07.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:27:07.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:27:07.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:07.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:07.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:07.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:07.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:07.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:07.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:07.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:07.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:07.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:27:07.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:ff:e4:31:0b:07:e1:b4:60:41:4d:1b:70:aa:c2:e1:1a:2d:cb:a7]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:27:46.466  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:27:46.478 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:27:46.481 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:27:46.482 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:27:46.482  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:27:46.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:27:46.489  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:27:46.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:27:46.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:27:46.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:27:46.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:27:46.505 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:27:46.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:27:46.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:27:46.708  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:27:46.709  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:27:46.710 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:27:46.711 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:27:46.713  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:27:46.717  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:27:46.718 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:46.718 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:46.719 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:46.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:46.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:46.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:46.722 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:27:46.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:27:46.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:27:46.724 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:27:46.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [31:12:62:46:27:16:cf:6d:51:fa:0b:0f:cc:df:9d:e3:06:7b:71:56]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:28:00.646  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:28:00.648 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:28:00.650 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:28:00.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:28:00.652  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:28:00.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:28:00.653  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:28:00.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:28:00.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:28:00.654 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:28:00.659 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:28:00.660 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:28:00.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:28:00.661 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:28:00.808  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:28:00.809  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:28:00.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:28:00.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:28:00.812  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:28:00.812  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:28:00.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:28:00.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:28:00.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:28:00.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:28:00.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:28:00.816 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:28:00.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:28:00.817 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:28:00.818 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:28:00.819 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:28:00.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [70:4d:a0:bc:35:ca:38:9f:af:d6:2f:83:2b:dc:b9:aa:74:92:68:3a]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:29:23.301  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:29:23.303 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:29:23.306 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:29:23.306 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:29:23.307  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:29:23.308  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:29:23.308  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:29:23.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:29:23.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:29:23.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:29:23.314 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:29:23.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:29:23.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:29:23.315 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:29:23.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:29:23.447  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:29:23.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:29:23.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:29:23.449  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:29:23.450  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:29:23.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:29:23.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:29:23.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:29:23.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:29:23.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:29:23.452 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:29:23.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:29:23.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:29:23.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:29:23.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:29:23.458 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c3:5f:7d:40:9f:d9:d6:c8:23:df:c6:cc:7d:23:50:c8:e5:88:ce:75]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:30:57.236  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:30:57.239 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:30:57.241 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-03 20:30:57.242 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:30:57.242  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-03 20:30:57.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:30:57.243  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:30:57.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:30:57.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:30:57.245 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:30:57.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:30:57.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:30:57.251 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:30:57.251 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:30:57.404  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:30:57.405  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:30:57.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:30:57.406 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:30:57.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:30:57.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:30:57.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:30:57.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:30:57.410 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:30:57.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:30:57.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:30:57.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:30:57.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:30:57.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:30:57.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:30:57.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:30:57.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: a43d413eedfc2fbe8737d1cd7b59f71ec18b1f353eb948c6c80bb14676a9f0176e13ada444f6218520acf1423439dd87e4b9c9a0c78863650bdbd8345dd37cdf92241d1eac03067efea3756c151c430879ed378448ad2963ce0e7865145bfde0b58a2bbbcc843669ac9be27c545a09b582dac8ba95a11f0e4c8fa5e0965ac089365d6ac9f1629bc7a9d379e7bc1d04928c1726475199ece3cd8e9d388828b14250617808fc6e78583da9ddf25c3d6695049e01af1424aaaa8a2624790d0ec60fc57f458918bb125e0a0d8af9d4da40c94d15b39dbe732c2b948996e3d79881a424504a4c2a842c86827432667204aeaa8cbc9dea1f1bc53bfb09aa20e3fd53bd0285b7b5080f60b60336f70048c5684e64d862e8ae4c8505b30159a1372509c943598afa7dfdf0f0885f00e5a9391c08c373c922c52542247536f9a38bbde247174a8f80ec6ef3b173484a6ea0f2b6e166d98b44c0305c9198e39032710728e45caaa6e5ecb8696dc32b240861e26246e59d999fa319791a176990d876190adb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:70:f9:ca:78:14:9d:ff:df:f1:00:42:86:67:0f:e2:6a:32:42:de]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:32:11.997  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:32:11.999 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:32:12.001 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:32:12.002 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:32:12.002  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:32:12.003  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:32:12.003  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:32:12.003 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:32:12.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:32:12.004 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:32:12.009 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:32:12.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:32:12.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:32:12.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:32:12.167  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:32:12.168  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:32:12.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:32:12.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:32:12.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:32:12.170  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:32:12.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:12.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:12.171 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:12.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:12.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:12.174 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:12.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:12.175 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:12.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:12.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:32:12.181 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:11:ac:40:97:63:c1:ca:1a:d5:f8:87:24:30:f7:00:ef:52:75:80]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:32:46.931  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:32:46.934 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:32:46.935 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:32:46.936 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:32:46.937  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:32:46.938  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:32:46.938  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:32:46.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:32:46.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:32:46.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:32:46.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:32:46.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:32:46.946 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:32:46.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:32:47.151  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:32:47.152  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:32:47.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:32:47.152 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:32:47.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:32:47.154  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:32:47.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:47.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:47.155 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:47.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:47.156 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:47.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:47.157 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:32:47.158 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:32:47.158 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:32:47.159 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:32:47.163 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:2e:51:0d:26:98:a5:d9:b4:56:ae:b4:2e:7c:06:f6:e8:bb:b5:83]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:33:18.680  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:33:18.681 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:33:18.683 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:33:18.684 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:33:18.684  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:33:18.685  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:33:18.686  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:33:18.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:33:18.688 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:33:18.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:33:18.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:33:18.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:33:18.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:33:18.699 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:33:18.828  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:33:18.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:33:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:33:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:33:18.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:33:18.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:33:18.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:33:18.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:33:18.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:33:18.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:33:18.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:33:18.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:33:18.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:33:18.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:33:18.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:33:18.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:33:18.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:1e:d8:3a:0c:91:1c:a9:7b:4a:1a:1e:42:6c:b7:06:30:13:8a:d3]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:36:30.247  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:36:30.249 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:36:30.253 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:36:30.253 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:36:30.254  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-03 20:36:30.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:36:30.255  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:36:30.255 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:36:30.256 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:36:30.256 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:36:30.261 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:36:30.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:36:30.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:36:30.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:36:30.425  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:36:30.426  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:36:30.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:36:30.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:36:30.428  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:36:30.428  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:36:30.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:36:30.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:36:30.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:36:30.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:36:30.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:36:30.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:36:30.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:36:30.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:36:30.431 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:36:30.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:36:30.436 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8e:13:6f:fb:98:b5:5e:2e:ba:b9:2c:61:75:79:32:26:ea:f3:72:03]
            modulus: a604abe7b11d7b0d60041f230012caba4e9a3de55bf1e66c2eb13f6c05445bfd139f7c93dc871ffca51c2e6c44281fe0f2366abb51620cd70c299b9164104c3c6292475e3f711bb37494e3da24c0abfaf065f82060ad4bec5b6e47aab005d4eb05574982d135ee6132cf2257d75de54661b192f5461904c84dff0794654754dddd7105fcce078bb192564b8a0c1ff341295c17b586eea7bfbf29c072040bd96eece484c97733dff03560b959ef1dfabbed092124158eb09b8ff6bf769aabd181065473141607bc80ef0257ff2f7be12b02b9616fe15e0704ca58692bcadb641266d4dec76b8a42fe75f2c94ad7c54c12e46ded3ee5f80fa21ac85596b1cbba89
    public exponent: 10001

] 
2021-11-03 20:40:41.328  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:40:41.331 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:40:41.333 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:40:41.334 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:40:41.335  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-03 20:40:41.336  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:40:41.336  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:40:41.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:40:41.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:40:41.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:40:41.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:40:41.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:40:41.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:40:41.345 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:40:41.522  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:40:41.524  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:40:41.525 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:40:41.526 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:40:41.528  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:40:41.528  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:40:41.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:40:41.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:40:41.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:40:41.530 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:40:41.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:40:41.531 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:40:41.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:40:41.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:40:41.533 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:40:41.534 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:40:41.537 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e1:d0:66:cc:4b:ca:36:c1:fc:de:29:be:3d:af:78:39:5e:02:c2:d8]
            modulus: 9de13d94e6b29b99ded943b026a36e64cc6947014eea90c2e244c6a9799aaef2c23b6f07d108b86328f42ad241f2857dcc15aef18396c533ca7eaab0009ec6528f69b489f75f6c8ec3ced27f357966f0d32f7335c1b58394bc2ac9692ea3ebd6cd4fb1d688df9e4efc00a99ec2e8022a878642db4bea72be84f2eec2a1ba3808d4d12ad58a22f64d75f9c2bae67599e346314051cd9b9183e5908707f5be340078d2b92bba47d09504a7d8a8a28bd32457c8a676438af55e302f4305152110c09810ac395ad0b83f07623f38bce50fddb8f9d021b7a8c2b1ac835d8f23e1d18afaea6df1855181c9c11f64a75a5b1a1037d021be92b96eb89774b4c702d34c9f
    public exponent: 10001

] 
2021-11-03 20:41:14.267  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:41:14.271 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:41:14.274 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:41:14.275 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:41:14.275  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-03 20:41:14.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:41:14.276  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:41:14.280 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:41:14.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:41:14.281 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:41:14.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:41:14.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:41:14.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:41:14.288 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:41:14.466  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:41:14.468  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:41:14.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:41:14.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:41:14.470  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:41:14.471  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:41:14.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:14.472 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:14.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:14.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:14.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:14.474 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:14.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:14.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:14.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:14.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:41:14.485 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: a43d413eedfc2fbe8737d1cd7b59f71ec18b1f353eb948c6c80bb14676a9f0176e13ada444f6218520acf1423439dd87e4b9c9a0c78863650bdbd8345dd37cdf92241d1eac03067efea3756c151c430879ed378448ad2963ce0e7865145bfde0b58a2bbbcc843669ac9be27c545a09b582dac8ba95a11f0e4c8fa5e0965ac089365d6ac9f1629bc7a9d379e7bc1d04928c1726475199ece3cd8e9d388828b14250617808fc6e78583da9ddf25c3d6695049e01af1424aaaa8a2624790d0ec60fc57f458918bb125e0a0d8af9d4da40c94d15b39dbe732c2b948996e3d79881a424504a4c2a842c86827432667204aeaa8cbc9dea1f1bc53bfb09aa20e3fd53bd0285b7b5080f60b60336f70048c5684e64d862e8ae4c8505b30159a1372509c943598afa7dfdf0f0885f00e5a9391c08c373c922c52542247536f9a38bbde247174a8f80ec6ef3b173484a6ea0f2b6e166d98b44c0305c9198e39032710728e45caaa6e5ecb8696dc32b240861e26246e59d999fa319791a176990d876190adb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e2:a5:a6:de:c9:3e:3b:40:be:70:fb:70:03:ff:ac:85:05:39:08:ac]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:41:50.055  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:41:50.056 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:41:50.059 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:41:50.060 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:41:50.061  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-03 20:41:50.061  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:41:50.062  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:41:50.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:41:50.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:41:50.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:41:50.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:41:50.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:41:50.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:41:50.071 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:41:50.229  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:41:50.230  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:41:50.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:41:50.231 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:41:50.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:41:50.233  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:41:50.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:50.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:50.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:50.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:50.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:50.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:50.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:41:50.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:41:50.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:41:50.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:41:50.240 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [65:57:9d:07:15:29:bc:a7:bd:ef:56:fd:7b:ed:61:df:70:df:ad:23]
            modulus: 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
    public exponent: 10001

] 
2021-11-03 20:43:35.610  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-03 20:43:35.612 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-03 20:43:35.614 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:43:35.615 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-03 20:43:35.615  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-03 20:43:35.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-03 20:43:35.616  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-03 20:43:35.616 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-03 20:43:35.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-03 20:43:35.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-03 20:43:35.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-03 20:43:35.623 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:43:35.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-03 20:43:35.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:43:35.752  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-03 20:43:35.753  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-03 20:43:35.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-03 20:43:35.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-03 20:43:35.755  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-03 20:43:35.755  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-03 20:43:35.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:43:35.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:43:35.756 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:43:35.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:43:35.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:43:35.757 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:43:35.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-03 20:43:35.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-03 20:43:35.759 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-03 20:43:35.760 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-03 20:43:35.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 338325967646115716068022475873847453230606819957
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 03 16:52:49 UTC 2021
           Final Date: Mon Nov 03 16:52:48 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [49:d4:58:7a:91:7e:a3:e8:3d:20:a5:f0:be:cd:b8:6f:7f:a5:cb:87]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 2a1c1b191cd6950db2b94336faef19b6c4c8b196
                       deb67b29db908f7ff079d19ffd1cf9d5ae9ff323
                       e33f5b5e3d8909622580f84ea6f8c320ffe71e18
                       4241a1c9a946a0cc80e5c07799c323833365837a
                       50f46118d733dab506de641282ae5970ac81c517
                       93cba7476256b477cb276b9113510352dbde562e
                       59438f2e8101bc3097393186dbeb88104472d4fb
                       d119fe67d37b863007921d0d9cf188814eedf4fa
                       9ffa70f7526a9db2a5064670a3b20a4f087fa9ab
                       2026b16b276a6709d2e1acc17a3fad6711e27c66
                       96f9bc7d5614ed1653b139e8ecda0468bc98fbe2
                       e8c34a29ad58ea67c8335ba747743d87ed4a7696
                       55a65cfb7090a1592dfee890512a2b66e0ad048f
                       ee9c671683932a1a8bb620258b00800a3331f29f
                       17a1202b0eb1b45f67bf4c8db4a330a347ea3c0e
                       1846002c59f866ac90d219b92d5c0ea0ff289561
                       a0189a8842fbead2266d19c9fb93571f8f33adb2
                       71e213a7236381353269685fd74e22a7d162e8d4
                       8a2965b34add4ccfadecc3508b17bb9beddec2ec
                       c3751d7d
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cc:1b:e4:1d:0d:a6:89:12:27:51:b8:57:cf:f2:7f:af:82:7b:1e:14]
            modulus: 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
    public exponent: 10001

]