Results

By type

          2021-10-07 02:30:52,905 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-07 02:30:57,108 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-07 02:31:00.320  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-07 02:31:15.204 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-07 02:31:16.903  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-07 02:31:17.798  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-07 02:31:30.623  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.211 seconds (JVM running for 48.376)
2021-10-07 02:32:19.915  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 02:32:20.006 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 02:32:20.212 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-07 02:32:20.296 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 02:32:20.398  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-07 02:32:20.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 02:32:20.403  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 02:32:20.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 02:32:20.406 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 02:32:20.409 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 02:32:20.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 02:32:20.500 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 02:32:20.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 02:32:20.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 02:32:20.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 02:32:20.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 02:32:22.290  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 02:32:22.293  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 02:32:22.294 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 02:32:22.296 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 02:32:22.303  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 02:32:22.304  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 02:32:22.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 02:32:22.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 02:32:22.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 02:32:22.316 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 02:32:22.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 02:32:22.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 02:32:22.400 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 02:32:22.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 02:32:22.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 02:32:22.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 02:32:22.517 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c9:35:48:62:f7:9d:fe:d5:9c:84:68:fd:08:4f:84:dd:87:93:d0:c0]
            modulus: df560aa908d9e5b014d9f6f99fbe646769ae3227174945bfeed6e6d163644f839ad2c7b3584e3f73d37d4cdaef7e7d528b13c57c44c3282699ee4458210339732b6786334f312a5d8eacdd6db0405789d7876272ecebd199ffdc5b733dc5949b362e1254523c577fb29b2a2a1ed6851c79bcdf676ebfb05bb318d7d145b542af78536ec0a57c28677cc247a90b684bb9b4087ea4c3fd055b4bc9f85970eab28b6d4823a9a95a2c968fa8e656aaa71b06672a473699073b0d96a5ae25c34ff549e7d5698a2d749ab254ebf92a5916e563bf9dbd89ba5df685fd1650c12de83ff121522076646982f51a3a201ecc9fc7fb3cbf63ec73fcf9005e67bb5e87c07dd3
    public exponent: 10001

] 
2021-10-07 06:34:42.098  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:34:42.100 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:34:42.102 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:34:42.104 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:34:42.105  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:34:42.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:34:42.106  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:34:42.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:34:42.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:34:42.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:34:42.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:34:42.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:34:42.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:34:42.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:34:42.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:34:42.410  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:34:42.411 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:34:42.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:34:42.416  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:34:42.417  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:34:42.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:34:42.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:34:42.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:34:42.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:34:42.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:34:42.420 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:34:42.421 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:34:42.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:34:42.422 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:34:42.495 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:34:42.501 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:f5:e6:f4:f1:a1:c2:27:3c:fe:e2:35:84:7d:46:10:1e:4c:5f:a9]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:36:46.401  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:36:46.402 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:36:46.495 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:36:46.497 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:36:46.498  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:36:46.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:36:46.500  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:36:46.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:36:46.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:36:46.502 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:36:46.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:36:46.596 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:36:46.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:36:46.597 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:36:46.685  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:36:46.695  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:36:46.696 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:36:46.696 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:36:46.698  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:36:46.699  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:36:46.700 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:36:46.700 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:36:46.701 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:36:46.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:36:46.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:36:46.702 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:36:46.703 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:36:46.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:36:46.704 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:36:46.705 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:36:46.708 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: b7f1fe1d0b57c6ca147b4c5d6b68b86ba2767705f7be3b00147e39184da9b3fc7d2404f36b4af8c12ab9eff96b8671b49524a17e48a931cb64cbc95f4c78297b12aae125f1975cde5e26519cc66615f3a2a8d522201c0e66dd408bc639e27d47314072c68f0a59f4744ad146389947617510f1179d9b06b3aa4a49f387d30ceca11c314e9c3088dde034add362e97d212bcc1eef0574fb3f71d37a3dbd91efafb1f259108a3cc61bbf2d9bc51c1bc2d08d85b348ba394174945cf9c013ec12dae3803b7443480e574e743c4455cac75e5edd10ee1b9d34fafbb73e8ab95be7349c52d366e336a39af5eead8b9e59ef4044e7020ab87cee0f29733cf12ea96bf8be431ed788a64866178948a60ce540210ad8a7468ad120ff25ee332d2cb9958d22fb380dde9a4f7c4a678b7df613b96e17b86c991cb12973eb48f64104675faec8ed4ac95884d4e297e447d1c3f4a290152ef6d189503ebf6061b78b01fb3a4ee227064d945ef4f089db4ebf44787480b5c04af4311400e087ce62a49c37740f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1a:31:ef:68:e8:d9:35:cb:37:19:49:56:83:3c:07:38:ad:fc:31:3a]
            modulus: c687b2fa7d7407f62724947774c01e7e9a5d7ad108ac5ef9ebd7f571a627504bd9f7025d173258452ff2845a3cde3525e9afac3587faf463d95f3718bc5fe8c5d2a2582cff3471cd07248f99864fe0f201c0c9b5ca6685ce516bde18b566c0374d50f6171b7015166e95f45a357a4d89bf9e21abf199855b8ebf50177a997b474f37386b3948500c12f3fb62c1566c6afeb410379520db89635fa4a3036542de04a82742d0210bdd581976e766b06b9e6016bbdf86b91402f426cc972f694ce3f95e60c7cb284269776f67ab3844ddfa93889b84e25848c66ad2f9a332f6ead28fa496473020bab7cd8c8836c38fc98c358eb9d6b6a6d5f0329d66d9057f810f
    public exponent: 10001

] 
2021-10-07 06:41:16.767  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:41:16.768 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:41:16.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-07 06:41:16.769 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:41:16.770  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-07 06:41:16.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:41:16.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:41:16.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:41:16.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:41:16.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:41:16.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:41:16.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:41:16.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:41:16.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:41:16.895  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:41:16.896  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:41:16.896 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:41:16.897 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:41:16.899  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:41:16.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:41:16.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:41:16.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:41:16.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:41:16.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:41:16.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:41:16.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:41:16.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:41:16.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:41:16.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:41:16.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:41:16.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:42:d4:4b:df:91:d8:29:f9:5c:f0:96:3e:0d:b8:0d:15:ae:dd:6b]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:43:07.752  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:43:07.754 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:43:07.756 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:43:07.756 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:43:07.757  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:43:07.757  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:43:07.757  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:43:07.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:43:07.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:43:07.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:43:07.762 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:43:07.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:43:07.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:43:07.763 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:43:07.882  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:43:07.883  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:43:07.894 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:43:07.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:43:07.897  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:43:07.897  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:43:07.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:43:07.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:43:07.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:43:07.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:43:07.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:43:07.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:43:07.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:43:07.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:43:07.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:43:07.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:43:07.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: b7f1fe1d0b57c6ca147b4c5d6b68b86ba2767705f7be3b00147e39184da9b3fc7d2404f36b4af8c12ab9eff96b8671b49524a17e48a931cb64cbc95f4c78297b12aae125f1975cde5e26519cc66615f3a2a8d522201c0e66dd408bc639e27d47314072c68f0a59f4744ad146389947617510f1179d9b06b3aa4a49f387d30ceca11c314e9c3088dde034add362e97d212bcc1eef0574fb3f71d37a3dbd91efafb1f259108a3cc61bbf2d9bc51c1bc2d08d85b348ba394174945cf9c013ec12dae3803b7443480e574e743c4455cac75e5edd10ee1b9d34fafbb73e8ab95be7349c52d366e336a39af5eead8b9e59ef4044e7020ab87cee0f29733cf12ea96bf8be431ed788a64866178948a60ce540210ad8a7468ad120ff25ee332d2cb9958d22fb380dde9a4f7c4a678b7df613b96e17b86c991cb12973eb48f64104675faec8ed4ac95884d4e297e447d1c3f4a290152ef6d189503ebf6061b78b01fb3a4ee227064d945ef4f089db4ebf44787480b5c04af4311400e087ce62a49c37740f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:97:4c:a7:5e:a9:5b:92:20:77:c0:30:07:02:5a:91:eb:95:fe:84]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:45:55.887  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:45:55.888 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:45:55.890 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:45:55.891 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:45:55.891  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:45:55.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:45:55.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:45:55.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:45:55.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:45:55.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:45:55.897 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:45:55.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:45:55.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:45:55.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:45:55.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:45:55.995  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:45:55.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:45:55.996 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:45:55.997  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:45:55.998  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:45:55.998 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:45:55.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:45:55.999 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:45:56.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:45:56.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:45:56.000 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:45:56.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:45:56.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:45:56.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:45:56.003 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:45:56.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:d0:98:87:b9:ff:89:98:38:b5:e2:51:d3:9e:45:f1:39:a5:da:b0]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:47:30.771  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:47:30.773 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:47:30.774 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:47:30.774 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:47:30.775  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:47:30.776  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:47:30.776  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:47:30.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:47:30.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:47:30.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:47:30.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:47:30.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:47:30.783 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:47:30.784 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:47:30.881  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:47:30.881  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:47:30.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:47:30.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:47:30.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:47:30.899  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:47:30.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:47:30.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:47:30.901 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:47:30.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:47:30.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:47:30.903 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:47:30.904 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:47:30.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:47:30.905 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:47:30.906 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:47:30.910 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:69:cd:3e:ee:39:48:6c:51:63:7c:f5:ac:82:ec:b1:a2:ca:0a:8d]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:48:02.645  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:48:02.646 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:48:02.648 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:48:02.649 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:48:02.649  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:48:02.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:48:02.650  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:48:02.650 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:48:02.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:48:02.651 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:48:02.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:48:02.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:02.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:02.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:02.787  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:48:02.795  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:48:02.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:48:02.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:02.798  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:48:02.799  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:48:02.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:02.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:02.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:02.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:02.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:02.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:02.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:02.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:02.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:02.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:48:02.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:82:a6:e9:08:64:9c:42:24:66:73:59:7b:45:b5:cc:fd:be:1d:7b]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:48:31.174  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:48:31.175 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:48:31.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:48:31.177 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:48:31.178  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:48:31.178  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:48:31.179  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:48:31.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:48:31.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:48:31.179 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:48:31.183 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:48:31.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:31.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:31.184 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:31.252  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:48:31.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:48:31.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:48:31.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:31.255  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:48:31.256  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:48:31.256 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:31.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:31.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:31.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:31.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:31.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:31.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:31.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:31.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:31.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:48:31.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:22:52:ea:25:1d:5b:10:f5:40:fd:2b:27:4c:fe:d7:94:53:c3:de]
            modulus: c4e89019024fc9850e209cfd65781c31282ab269604cab5c884b4da27ba9b276629e3331cb01840713e7136f946f914bd2fc06992973f65967ac873842b924ba2f16c44b50a236d3da2d8ccd9ec56ddc16e8adf29a4dbfc36dede6589bba822793b24f6348b17df0fcdad6a1ca279d9e4c378221914a8347f88b35597fc3e6d4a035b33cf3b6706352d0f00db2649f0f531a5a602d0311cb9b3853b1add12c7de40ea4e51ffddfabcd184a9f23345a6fa37e78eeab8b2ebe5bbd564f7166f155b78b863867fc5cc9efee771fa66a2d57581e5601fafdd12f578d1b903ba3f2edab6832922554e8b8768c58556e1a918359fe52f6e4777230f3c5ebc3f17c3933
    public exponent: 10001

] 
2021-10-07 06:48:32.324  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:48:32.325 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:48:32.327 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:48:32.328 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:48:32.328  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:48:32.328  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:48:32.329  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:48:32.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:48:32.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:48:32.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:48:32.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:48:32.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:32.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:48:32.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:32.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:48:32.463  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:48:32.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:48:32.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:48:32.466  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:48:32.466  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:48:32.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:32.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:32.467 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:32.496 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:32.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:32.497 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:32.498 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:48:32.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:48:32.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:48:32.499 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:48:32.502 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:96:75:fb:77:5c:ce:eb:cf:54:4a:cd:94:c1:96:1a:15:d3:96:0f]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:49:02.626  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:49:02.627 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:49:02.628 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-07 06:49:02.629 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:49:02.629  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-07 06:49:02.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:49:02.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:49:02.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:49:02.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:49:02.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:49:02.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:49:02.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:49:02.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:49:02.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:49:02.787  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:49:02.788  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:49:02.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:49:02.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:49:02.791  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:49:02.792  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:49:02.792 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:02.793 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:02.793 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:02.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:02.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:02.795 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:02.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:02.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:02.796 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:02.798 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:49:02.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:02:45:1a:4f:3c:54:cc:bb:eb:f6:c0:b8:75:d7:1f:cf:b0:69:02]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:49:43.716  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:49:43.717 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:49:43.718 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-07 06:49:43.718 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:49:43.719  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-07 06:49:43.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:49:43.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:49:43.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:49:43.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:49:43.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:49:43.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:49:43.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:49:43.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:49:43.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:49:43.888  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:49:43.888  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:49:43.889 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:49:43.889 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:49:43.891  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:49:43.892  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:49:43.892 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:43.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:43.893 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:43.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:43.894 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:43.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:43.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:49:43.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:49:43.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:49:43.896 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:49:43.900 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:87:10:39:a0:a8:5d:13:b7:9a:e7:31:23:ce:fd:11:28:68:53:b5]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:52:05.019  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:52:05.023 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:52:05.025 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:52:05.027 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:52:05.030  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 06:52:05.030  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:52:05.031  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:52:05.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:52:05.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:52:05.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:52:05.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:52:05.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:52:05.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:52:05.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:52:05.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:52:05.235  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:52:05.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:52:05.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:52:05.237  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:52:05.237  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:52:05.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:52:05.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:52:05.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:52:05.238 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:52:05.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:52:05.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:52:05.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:52:05.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:52:05.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:52:05.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:52:05.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:79:87:4a:46:4a:d4:6b:c3:15:78:4c:4b:1e:30:4f:21:75:ff:58]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:53:26.754  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:53:26.755 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:53:26.756 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:53:26.757 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:53:26.757  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:53:26.757  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:53:26.758  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:53:26.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:53:26.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:53:26.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:53:26.763 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:53:26.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:53:26.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:53:26.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:53:26.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:53:26.850  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:53:26.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:53:26.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:53:26.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:53:26.851  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:53:26.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:26.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:26.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:26.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:26.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:26.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:26.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:26.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:26.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:26.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:53:26.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:79:e9:6d:30:84:89:bc:cc:21:2d:d7:76:cf:91:d4:a7:a4:44:1c]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:53:50.006  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:53:50.007 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:53:50.008 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:53:50.009 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:53:50.009  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-07 06:53:50.010  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:53:50.010  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:53:50.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:53:50.010 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:53:50.011 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:53:50.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:53:50.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:53:50.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:53:50.015 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:53:50.101  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:53:50.102  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:53:50.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:53:50.103 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:53:50.105  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:53:50.106  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:53:50.106 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:50.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:50.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:50.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:50.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:50.108 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:50.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:53:50.109 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:53:50.110 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:53:50.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:53:50.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3e:19:fe:b7:2a:c6:4b:a4:a3:5c:e9:17:9b:af:67:91:bb:e3:d2:4a]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:55:18.296  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:55:18.297 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:55:18.299 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-07 06:55:18.299 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:55:18.300  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-07 06:55:18.300  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:55:18.300  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:55:18.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:55:18.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:55:18.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:55:18.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:55:18.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:55:18.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:55:18.308 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:55:18.422  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:55:18.423  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:55:18.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:55:18.423 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:55:18.425  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:55:18.425  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:55:18.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:55:18.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:55:18.426 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:55:18.427 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:55:18.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:55:18.428 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:55:18.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:55:18.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:55:18.429 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:55:18.430 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:55:18.433 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [44:e4:91:7a:b9:65:9c:17:81:fa:c5:47:2b:cc:cb:3a:8f:8b:4d:78]
            modulus: e31a1c0787a6d84a1283747151d9cf2afe3e17224ebf90b9e786cca5707e2b5b633b3f2545c8bad3b93026b0099ac9543c9ffe9c7641a5dddb9175e4bf3959b7068fba309aed26a026ecdb1c00b326442e6f97ffb67b7448d073e4ac7bcdf3f651aed3b6afa7c0fae2414866df5b0cf1f167d0c58d5a0655d98f5d8c55e5d7551d612c11922ddb986939e53a12bcb994d8b3ea3e27b0f5ede33b22babfcd947cb9c76273a04bd0f8a76fb0165afb2a1820ca8d3f1d3bdefb7665b5d860cb378c9a85d8f922bf89db5ea0082ae148bb0ff90332e4f299071e1afa7bcf42ecd89ab17094f9a0e756452116d1b43176e1631c68cd7b18fe34558c87d6922f715fd5
    public exponent: 10001

] 
2021-10-07 06:58:01.677  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:58:01.682 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:58:01.683 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:58:01.684 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:58:01.687  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-07 06:58:01.688  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:58:01.688  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:58:01.691 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:58:01.692 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:58:01.695 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:58:01.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:58:01.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:58:01.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:58:01.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:58:01.825  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:58:01.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:58:01.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:58:01.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:58:01.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:58:01.830  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:58:01.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:01.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:01.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:01.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:01.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:01.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:01.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:01.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:01.833 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:01.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:58:01.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:72:41:d6:21:c9:eb:a0:18:ff:d2:28:2b:40:2a:42:09:e2:78:10]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:58:32.897  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:58:32.898 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:58:32.900 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-07 06:58:32.900 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:58:32.901  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-07 06:58:32.901  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:58:32.901  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:58:32.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:58:32.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:58:32.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:58:32.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:58:32.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:58:32.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:58:32.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:58:32.987  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:58:32.988  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:58:32.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:58:32.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:58:32.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:58:32.991  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:58:32.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:32.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:32.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:32.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:32.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:32.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:32.994 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:58:32.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:58:32.995 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:58:32.996 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:58:32.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:a0:ea:d4:c4:0c:9b:a9:d2:79:87:0b:5c:d2:e5:23:a6:e7:2e:fe]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 06:59:06.263  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 06:59:06.264 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 06:59:06.265 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-07 06:59:06.266 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 06:59:06.266  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-07 06:59:06.266  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 06:59:06.266  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 06:59:06.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 06:59:06.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 06:59:06.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 06:59:06.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 06:59:06.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:59:06.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 06:59:06.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:59:06.405  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 06:59:06.406  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 06:59:06.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 06:59:06.406 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 06:59:06.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 06:59:06.408  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 06:59:06.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:59:06.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:59:06.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:59:06.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:59:06.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:59:06.410 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:59:06.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 06:59:06.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 06:59:06.412 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 06:59:06.413 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 06:59:06.496 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [00:79:e4:5e:9f:07:b9:89:1e:af:c1:b8:12:36:95:3c:ac:63:f5:94]
            modulus: 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
    public exponent: 10001

] 
2021-10-07 07:01:12.144  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-07 07:01:12.145 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-07 07:01:12.147 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 07:01:12.147 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-07 07:01:12.148  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-07 07:01:12.148  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-07 07:01:12.148  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-07 07:01:12.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-07 07:01:12.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-07 07:01:12.150 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-07 07:01:12.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-07 07:01:12.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 07:01:12.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-07 07:01:12.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 07:01:12.249  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-07 07:01:12.250  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-07 07:01:12.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-07 07:01:12.250 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-07 07:01:12.251  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-07 07:01:12.252  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-07 07:01:12.252 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 07:01:12.252 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 07:01:12.252 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 07:01:12.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 07:01:12.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 07:01:12.253 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 07:01:12.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-07 07:01:12.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-07 07:01:12.254 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-07 07:01:12.255 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-07 07:01:12.257 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 301479064821122281715263295466554995528072926617
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Oct 07 02:23:22 UTC 2021
           Final Date: Tue Oct 07 02:23:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [b4:11:17:34:78:2c:48:3f:0f:47:6e:fe:37:00:43:79:82:aa:26:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 9157335c5cce3fec9c6766b972652a88e19605c1
                       5d907385b01af8e24e2ccb77f0e4b768593cb530
                       8cdb13c71e5824d204954e14e43a7029cc39a748
                       448343a8286bea2c2a7c6e623b1ae02e8ca23f0c
                       187421d11d873e115f10a56cf34489b5654787c3
                       17b8301dfe130a40344807de42431f44291fd25c
                       a5a8164f36cf648440efb3781f9f3e108ff6ffd0
                       3bccdf926f58627a90de9795966ffa493045349e
                       9f74a1b88e50b9741af50388ccd3811162e81985
                       a29ee7790d908f376088ab045dfef8d08acbaaeb
                       71da6679adcb1b3c4adca6d0554d47cf41f831d0
                       8e6563d57e0c6b7066e9c877d835917c6280877f
                       b07ec3391ed0d419a7fe52393bfdcaa78107def5
                       98a3620e1f550e0c076887f33b2da1c6b7dd3c44
                       92bf6229fb9bcda17a98645d94b4bed06816cc49
                       04d9e5585963b103378d8d000d5de876f15f718a
                       4dac3b909b6acde72d069157ae90b01e63410392
                       f7ffbde121fe523ff78fc4dce4cd347f0ae01f91
                       f0c441aa4bd1aac177a3f0ee7a75685118764e2e
                       1692d2ba
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8b:c2:a8:46:e3:c2:16:f7:57:70:92:35:13:ca:c8:9f:ef:77:34:f9]
            modulus: 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
    public exponent: 10001

]