Results

By type

          2021-10-15 11:07:54,997 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-15 11:08:00,493 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-15 11:08:06.004  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-15 11:08:23.495 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-15 11:08:25.005  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-15 11:08:26.495  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-15 11:08:42.893  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 50.894 seconds (JVM running for 60.598)
2021-10-15 11:09:19.389  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 11:09:19.400 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 11:09:19.604 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-15 11:09:19.609 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 11:09:19.796  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-15 11:09:19.800  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 11:09:19.801  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 11:09:19.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 11:09:19.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 11:09:19.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 11:09:19.899 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 11:09:19.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 11:09:20.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 11:09:20.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 11:09:20.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 11:09:20.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 11:09:22.400  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 11:09:22.488  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 11:09:22.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 11:09:22.492 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 11:09:22.588  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 11:09:22.589  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 11:09:22.590 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 11:09:22.591 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 11:09:22.591 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 11:09:22.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 11:09:22.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 11:09:22.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 11:09:22.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 11:09:22.785 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 11:09:22.787 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 11:09:22.789 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 11:09:22.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:6b:4b:2c:35:42:04:4c:4a:47:b7:37:80:f3:a4:d8:be:f6:07:0f]
            modulus: acc83446d22c12b851340d5a026a09ca08e917e4d3700e2045751f6176f124004f35b0143bf2ab2a60b5fece0e2aa18e5d409a398a12d5040d4e89014b7d278128a04143c307eb7fff0756ff693d2ada6d366c3eca19931d815131411498bf6791ae89b962c6e20ae72267f1485239564d5242865e1c976c5fdd78040b274e6c2e18d008c2d1b957324bc32b28ec550a985173f5bce52007c6f23221f1631eca6bfd9b7f86e4eae1bd25baaae4fff88ef772145ed60cc8f5077cf2eae50b81c00c0197ae1e450dd2dd9cda77085ae32db70fc2e0e0077511fc2b5a4640a926d6a98df9e47fdca22b11c0939a8ff3d88cf8c0ee6bd66733433e7dd1e30f89e6c5
    public exponent: 10001

] 
2021-10-15 15:56:25.499  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 15:56:25.586 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 15:56:25.589 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 15:56:25.591 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 15:56:25.593  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 15:56:25.686  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 15:56:25.688  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 15:56:25.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 15:56:25.690 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 15:56:25.692 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 15:56:25.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 15:56:25.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 15:56:25.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 15:56:25.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 15:56:26.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 15:56:26.192  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 15:56:26.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 15:56:26.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 15:56:26.199  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 15:56:26.200  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 15:56:26.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:56:26.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:56:26.201 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:56:26.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:56:26.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:56:26.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:56:26.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:56:26.206 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:56:26.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:56:26.209 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 15:56:26.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:7b:ce:e2:ef:ef:28:2f:1d:e6:23:fe:15:55:c1:68:60:40:52:04]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 15:58:13.487  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 15:58:13.489 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 15:58:13.492 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 15:58:13.493 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 15:58:13.494  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 15:58:13.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 15:58:13.496  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 15:58:13.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 15:58:13.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 15:58:13.498 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 15:58:13.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 15:58:13.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 15:58:13.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 15:58:13.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 15:58:13.920  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 15:58:13.922  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 15:58:13.922 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 15:58:13.923 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 15:58:13.933  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 15:58:13.934  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 15:58:13.935 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:58:13.936 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:58:13.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:58:13.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:58:13.988 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:58:13.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:58:13.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 15:58:13.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 15:58:13.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 15:58:13.992 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 15:58:14.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6e:91:f3:1d:2a:4f:33:f9:61:80:5b:38:3d:8a:68:63:6a:f8:e2:85]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:01:18.841  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:01:18.887 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:01:18.889 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 16:01:18.890 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:01:18.891  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 16:01:18.892  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:01:18.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:01:18.893 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:01:18.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:01:18.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:01:18.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:01:18.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:01:18.986 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:01:18.987 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:01:19.214  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:01:19.215  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:01:19.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:01:19.216 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:01:19.217  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:01:19.218  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:01:19.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:19.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:19.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:19.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:19.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:19.221 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:19.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:19.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:19.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:19.224 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:01:19.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9b:54:f3:35:34:19:c6:3f:5e:96:9d:26:0b:29:8e:a2:80:ca:d2:15]
            modulus: c268d4992b6804a0919f20f7076bf7ca9e808ee75cbf99ef2c4732e135c69f443786bb5656f32bc987460170ef984ac82e37202b414f3b61dbcd60c861424d352824e5ca82ceba0b5eda41f3b56da8b41d2074f750318f058cb2728e50a6c84f301105231eb011fa73d595b751509c7ea893d38268ea4b66e0bcbbeb670e288d3b5d7029ebdc54b2251063e8af78a0aabb29006ac907fc3ddc20c971cce9b2b14d4d72358e0bf0b0fd3cbec638796a8ef464008a38bbee2d4a93c9b1d771ad473972067cb18fc0c7a9bf4357be87cfc304095b39ca2571e14f5ac3e64487de368eeaeaadf79b23e9021f4188e3ddc8cb147f982a5b2c5b1f7250b84bac38c7e9
    public exponent: 10001

] 
2021-10-15 16:01:55.135  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:01:55.137 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:01:55.138 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:01:55.139 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:01:55.140  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:01:55.141  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:01:55.141  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:01:55.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:01:55.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:01:55.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:01:55.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:01:55.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:01:55.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:01:55.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:01:55.492  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:01:55.493  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:01:55.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:01:55.500 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:01:55.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:01:55.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:01:55.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:55.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:55.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:55.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:55.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:55.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:55.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:01:55.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:01:55.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:01:55.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:01:55.693 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:cb:64:af:ee:0a:8a:23:aa:ee:66:a6:72:55:2f:5b:4d:09:ee:f0]
            modulus: c519869273234c1a754f16b6f6e8ca7419d3f219a83bbeab3148b18132a69e26b9ecb6333899bf9a16e1240ae4bcdaaead1df123b7dfb42c17c17798779b5667c8e1906bbb4f667969fcbe26d22c04b5be4c3e75e92abafd934a48939af7fa466a135247a407531c40283db9a5dccde20dc7e903eb6716c8f916f6b1585f7cbede74dde4dd4af2aa21419c3e35ba2a5dd8fb6e86d2de1273c55c8c903fd6e12649561eaaf39d3b4885ca498a3275f685a43d65f80b83ef50ab17371ad60f63c048e791662c549132269b33825eaa9d460e7b67c62cd5c7684213cbaf96d2e415b9bbc57b32a54c87f10fc8cc8f2e69d8d6d6b835e2b211c656aadfc05c5b2669
    public exponent: 10001

] 
2021-10-15 16:06:59.734  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:06:59.736 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:06:59.738 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:06:59.739 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:06:59.739  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:06:59.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:06:59.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:06:59.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:06:59.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:06:59.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:06:59.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:06:59.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:06:59.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:06:59.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:07:00.062  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:07:00.086  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:07:00.086 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:07:00.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:07:00.089  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:07:00.089  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:07:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:07:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:07:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:07:00.091 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:07:00.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:07:00.092 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:07:00.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:07:00.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:07:00.094 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:07:00.095 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:07:00.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [76:15:09:99:83:5c:e2:69:ea:9e:de:81:ce:28:2a:fb:68:8f:8b:8f]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:08:13.729  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:08:13.731 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:08:13.734 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 16:08:13.734 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:08:13.735  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-15 16:08:13.735  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:08:13.735  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:08:13.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:08:13.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:08:13.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:08:13.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:08:13.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:08:13.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:08:13.797 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:08:16.264  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:08:16.265  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:08:16.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:08:16.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:08:16.267  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:08:16.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:08:16.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:08:16.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:08:16.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:08:16.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:08:16.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:08:16.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:08:16.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:08:16.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:08:16.272 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:08:16.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:08:16.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [df:8d:08:7f:2c:77:14:de:d3:ed:0a:61:06:6b:04:9d:93:bc:cc:b0]
            modulus: dfe7a1004c88ee4ae4fbaeb09494db563a8f5a68b5d1fae1813c783d406d4e2e9066dd473eb2c433156f3d5288083c9c7fa6c224e2d10ee9b431a8a39ea57daf9e1e19f006c75964b763445fd15a87ae6155ca4d1f70faacc6a05c5ddfeba7100ccd5566aba114119830edf03d55f65c92eb4e115f4799ea2d62a80664a78ebbb08f1b8839fe507dfebe73bf2e384923014145b97f94fd0461abe50641a489d4778468d9713208469ff1e56dd3e120ca9e0576af5a86353945e8bdfae3f737e1075cb65c06e7a4cb8ba6b746b4eec31f8e0cf1e6dee7488d153c3583464af0a0f335e2c56a552c4721d649607ce02676e50e4ae3dc930f3fec6d88aef39c6a1d
    public exponent: 10001

] 
2021-10-15 16:09:03.860  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:09:03.861 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:09:03.863 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:09:03.864 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:09:03.865  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:09:03.865  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:09:03.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:09:03.885 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:09:03.886 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:09:03.887 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:09:03.904 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:09:03.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:09:03.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:09:03.987 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:09:04.448  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:09:04.449  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:09:04.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:09:04.450 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:09:04.459  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:09:04.460  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:09:04.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:04.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:04.461 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:04.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:04.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:04.462 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:04.463 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:04.463 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:04.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:04.464 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:09:04.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:e9:53:a5:56:cc:a0:65:89:22:64:b1:3f:1c:4d:3a:7a:8b:a5:88]
            modulus: c1be13ebbcd46f53101e347e1dddc77c2994e3176c02104123d30ece6f7d6ec97adb8017b72c1ce5588f3b346be6930591bfc0256ac766895eb86b4629dfb07c6951537f3ba0beb78fbfb6fbb5dba456809de1d6cf3fcebdaf25e2d256227cbfd0c4c4775ecaf03e25541e9ea99032600edafefe541453856ef4cba47fd9ea31f3f8467caefc691aec4e3866b21554b0341def101f28a92cc0ee2e1800d5b457c81f13e7994c4e5816bb9736176cd2bffe6ad5f36b4d18aeb428935399ffa2997876e046c529988b27fca32e09dd3bcbfbe14b8068b7d7d6958c169729ce1e66e81d71129a0875f14a2b0d7ccbeb527fca3de988eb84e0a56bad2a7beb923db7
    public exponent: 10001

] 
2021-10-15 16:09:24.066  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:09:24.068 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:09:24.069 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:09:24.069 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:09:24.080  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:09:24.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:09:24.085  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:09:24.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:09:24.086 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:09:24.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:09:24.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:09:24.110 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:09:24.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:09:24.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:09:24.428  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:09:24.429  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:09:24.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:09:24.430 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:09:24.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:09:24.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:09:24.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:24.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:24.435 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:24.436 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:24.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:24.449 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:24.452 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:09:24.452 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:09:24.453 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:09:24.453 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:09:24.457 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:ef:78:4c:05:59:5e:98:f9:88:b8:0d:82:30:ac:73:e4:7c:08:ec]
            modulus: bd601ca74e049797dfead8f563d551ed7ff290dbcacd41f642b6f98e28a5a0d97ce13c945c530935af93e50c2f092dd96e02b6d69805d95d99622036595e2790c99d028f99cc76fc60fc6cd6a5fbb8015d7376698770e7050c02f36da783711ff3df7fd85218954e0e66aeeaa03e6f278d89ec4a10830c2edcdd0a380d0d0070ff3ba73c1a8905ec4fdbcb0c756136e01a634d2fe111bb26431ef962896405f7b7efaed9e1957675c3ddc20cddf6874214e4a0d6ba79a3e7149ad76a571aa893ce2ce0f7a07f79f7073b531018246551a4d2565d239b83a408f41ac9fdc3f8ded4439fcf1cef0cf22b69a14d10138d09496cfcbcb2e4d3ee3d0f346e7539b32f
    public exponent: 10001

] 
2021-10-15 16:11:00.135  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:11:00.136 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:11:00.137 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:11:00.138 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:11:00.138  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:11:00.139  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:11:00.139  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:11:00.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:11:00.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:11:00.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:11:00.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:11:00.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:11:00.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:11:00.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:11:00.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:11:00.428  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:11:00.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:11:00.429 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:11:00.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:11:00.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:11:00.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:11:00.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:11:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:11:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:11:00.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:11:00.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:11:00.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:11:00.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:11:00.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:11:00.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:11:00.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [dc:96:02:90:91:77:bc:bc:89:7b:6f:b0:f2:1d:60:e9:1e:ff:56:dd]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:13:38.316  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:13:38.317 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:13:38.319 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:13:38.320 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:13:38.320  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:13:38.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:13:38.321  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:13:38.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:13:38.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:13:38.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:13:38.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:13:38.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:13:38.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:13:38.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:13:38.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:13:38.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:13:38.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:13:38.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:13:38.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:13:38.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:13:38.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:38.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:38.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:38.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:38.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:38.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:38.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:38.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:38.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:38.637 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:13:38.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ca:fa:da:91:e3:16:59:42:4a:6d:d7:67:8d:a9:b2:94:75:cb:f1:e1]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:13:49.143  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:13:49.144 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:13:49.146 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-15 16:13:49.146 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:13:49.147  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-15 16:13:49.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:13:49.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:13:49.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:13:49.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:13:49.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:13:49.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:13:49.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:13:49.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:13:49.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:13:49.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:13:49.441  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:13:49.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:13:49.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:13:49.443  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:13:49.444  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:13:49.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:49.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:49.444 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:49.445 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:49.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:13:49.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:13:49.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:13:49.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:13:49.450 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:b4:75:df:26:f2:12:d4:23:98:b1:45:5f:a1:a5:d2:aa:97:66:b1]
            modulus: c68dcc2d5ec8392be61fdd7b98e4fb32b8b83ede8d8407852c06e1a3bea5e4fb8f5c158185310c2f4684bd8c2590e862990a0b1fdab740779501145b13ca292540ef354862e33f9966e04b049578f3d0f94f1ac97398035c0fde06a53af35058b6b305db25a8b8b2bbbbecec8915411584033c46676767dc8c5f4128d4df0d36e68c5b38b2189f8045496617a1133e58e1239772953c5d14105d6b25bc1593665393f5196fe3c8f65bb8e8ad076d3978f30b319b132d0e5fa342f5d135008f6c204fb19d538a9cd4396d466f18685f2228ccd2b59e168e13837b5da188024916680456a8da45c91b2c378bd6b76cbb0a56309948249df2aaa92b5ff6b0f27503
    public exponent: 10001

] 
2021-10-15 16:14:23.391  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:14:23.392 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:14:23.394 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-15 16:14:23.394 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:14:23.394  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-15 16:14:23.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:14:23.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:14:23.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:14:23.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:14:23.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:14:23.405 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:14:23.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:14:23.406 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:14:23.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:14:23.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:14:23.663  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:14:23.663 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:14:23.664 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:14:23.665  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:14:23.665  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:14:23.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:14:23.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:14:23.672 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:14:23.674 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:14:23.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:14:23.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:14:23.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:14:23.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:14:23.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:14:23.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:14:23.681 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [48:92:c0:4e:82:49:15:7b:51:68:70:76:d6:7b:73:cc:3a:fb:15:d2]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:15:37.816  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:15:37.817 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:15:37.818 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:15:37.820 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:15:37.821  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:15:37.821  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:15:37.822  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:15:37.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:15:37.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:15:37.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:15:37.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:15:37.830 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:15:37.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:15:37.886 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:15:38.044  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:15:38.045  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:15:38.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:15:38.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:15:38.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:15:38.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:15:38.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:15:38.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:15:38.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:15:38.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:15:38.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:15:38.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:15:38.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:15:38.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:15:38.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:15:38.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:15:38.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 9a507c39132b3f5842c9c144802a67b24604d408c9b88034cae41ec30abb341e04ed7fbcc887b2562367552b8ba86e7e530e84ea1e6288f68c9d3345b8842b730287dc2929d4bb4f407487ac8c994c0bfa9a2a66b67ca19fde4cf9cd4e7e1b71e6258a54fdde22933d81f7e6bf3ee448d10a0e0ccea9a7baeb420758acffdb25e743c2111086213d254eee5f8ca78f9ce4b7b0eb9145217d6ea87e220ce46509b6188ebc168f7174e443fb4c14f9d0fab3e25aaa2a9cfa25cb222cef96bfb0c0007c6de987c6a36e29b39d1f69f747da7b6b3ba764ef5bdd3a99b0084ac82de47e58fa0ccd7513b6a35da5a0569ffec72425c303ec216600a3cb7de9043166f87ec63f719a1ce52bbdec2bf0cbec875c679bcd8d8793765a299c7a78efa21162edda5d3dfe1105b478aae76d9751b7ace88a8ceed3185bfea98683be13172de1bda3b506d887a13dfac7df83b7af567d92d2e57f96100d470caf46f101ea8f797fc3aa7611f3cc9d44b36aec80e7f709fa0f9378b57c197c3232ff35dac4894f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:5c:37:fb:a2:77:7a:e6:e1:4a:e4:5b:7a:11:d2:c2:83:8c:d6:d5]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:16:49.991  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:16:49.992 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:16:49.993 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:16:49.994 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:16:49.994  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-15 16:16:49.995  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:16:49.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:16:49.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:16:49.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:16:49.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:16:50.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:16:50.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:16:50.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:16:50.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:16:50.148  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:16:50.149  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:16:50.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:16:50.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:16:50.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:16:50.151  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:16:50.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:16:50.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:16:50.152 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:16:50.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:16:50.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:16:50.153 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:16:50.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:16:50.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:16:50.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:16:50.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:16:50.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b1:12:4e:17:4c:be:26:79:02:7d:61:6f:d4:b3:a2:9f:34:0c:08:9b]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:17:10.225  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:17:10.226 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:17:10.227 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:17:10.228 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:17:10.228  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-15 16:17:10.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:17:10.229  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:17:10.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:17:10.229 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:17:10.230 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:17:10.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:17:10.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:17:10.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:17:10.285 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:17:10.464  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:17:10.465  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:17:10.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:17:10.466 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:17:10.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:17:10.467  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:17:10.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:17:10.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:17:10.468 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:17:10.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:17:10.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:17:10.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:17:10.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:17:10.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:17:10.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:17:10.474 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:17:10.477 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5a:1b:55:e9:db:ae:8f:25:87:1e:52:53:32:ef:c8:0f:57:f1:3f:6a]
            modulus: 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
    public exponent: 10001

] 
2021-10-15 16:19:25.212  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-15 16:19:25.214 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-15 16:19:25.215 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:19:25.216 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-15 16:19:25.216  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-15 16:19:25.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-15 16:19:25.217  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-15 16:19:25.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-15 16:19:25.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-15 16:19:25.218 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-15 16:19:25.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-15 16:19:25.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:19:25.229 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-15 16:19:25.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:19:25.509  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-15 16:19:25.510  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-15 16:19:25.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-15 16:19:25.511 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-15 16:19:25.512  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-15 16:19:25.512  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-15 16:19:25.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:19:25.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:19:25.513 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:19:25.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:19:25.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:19:25.514 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:19:25.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-15 16:19:25.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-15 16:19:25.515 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-15 16:19:25.516 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-15 16:19:25.519 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 465408111461636177323576185355031142758104429390
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 15 11:02:40 UTC 2021
           Final Date: Wed Oct 15 11:02:39 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a9:88:0a:9c:ab:0c:f9:8b:1b:ad:25:92:58:fc:9b:86:3e:fd:5b:a8]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 594b483823ce6d9073b1b30b16bb1a103b07412e
                       ec1022233af88bd6663f4fc3ad010c1f7b5602dd
                       644c9919eef260062ea8fb9a53700f86f4bfebf5
                       dd9faab79d7f9caa1066f88d44fbc8f0fac3d62d
                       d79c00116559c2f0bf21e87fa0fc4f7981000b43
                       f882029274b50a198b9ce328ef49203d37ff224b
                       1ccce8c454570e293ca26baa7d10d5d41d690f3b
                       376341b9997cd3dae1e7a4f2ea5bce3ffa602c57
                       bfc7a54687cbcff59dfa428de07d3353587ac67c
                       6228c9c7ccdbfbcc29792599b85ba6667eb6ad9d
                       aa2753d362349610963d4d114135c77b1464b25d
                       b0043e4f4e72291639b761bf1b9ef46b5a45d841
                       e30bfa5f33b8b251ceecb7a0d23938937e8ccf54
                       4b6f121fc69025e0390f23c9884cd313c095580e
                       01afa402944b8d2851bb0d005ec7415897de547c
                       c83a35f9320e19e593b445301bd0cedd3d7e0b3e
                       2022f7fd2b04d136ea8189334796a28120df33c1
                       9ed6d52d322baf8bdaa8af8bb486d12ce702a56e
                       6d7042493fd5c2e800dbbf078f7b18e0d7e5c090
                       4056902f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [30:a5:ff:10:e9:dd:e5:43:f3:b3:f0:5a:fb:54:10:51:c2:74:32:ee]
            modulus: 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
    public exponent: 10001

]