Results

By type

          2021-10-08 22:53:40,352 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-08 22:53:44,765 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-08 22:53:47.966  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-08 22:54:03.167 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-08 22:54:04.172  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-08 22:54:04.680  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-08 22:54:17.859  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.076 seconds (JVM running for 48.353)
2021-10-08 23:02:40.069  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 23:02:40.160 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 23:02:40.350 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 23:02:40.353 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 23:02:40.367  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 23:02:40.370  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 23:02:40.371  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 23:02:40.372 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 23:02:40.373 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 23:02:40.452 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 23:02:40.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 23:02:40.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 23:02:40.652 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 23:02:40.660 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 23:02:40.661 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 23:02:40.665 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 23:02:42.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 23:02:42.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 23:02:42.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 23:02:42.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 23:02:42.766  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 23:02:42.767  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 23:02:42.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 23:02:42.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 23:02:42.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 23:02:42.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 23:02:42.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 23:02:42.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 23:02:42.955 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 23:02:42.956 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 23:02:42.957 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 23:02:42.959 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 23:02:43.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a6:72:47:d8:33:11:10:3b:48:dc:e5:23:56:7b:ad:19:06:5b:9f:cb]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:20:50.591  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:20:50.649 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:20:50.653 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-11 15:20:50.655 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:20:50.656  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-11 15:20:50.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:20:50.657  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:20:50.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:20:50.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:20:50.659 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:20:50.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:20:50.751 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:20:50.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:20:50.752 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:20:51.258  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:20:51.259  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:20:51.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:20:51.261 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:20:51.350  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:20:51.352  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:20:51.353 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:20:51.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:20:51.354 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:20:51.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:20:51.356 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:20:51.357 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:20:51.358 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:20:51.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:20:51.451 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:20:51.453 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:20:51.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:cf:1c:bf:87:64:0c:d0:0f:71:c6:90:ce:2b:9f:fa:81:48:ff:ff]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:23:35.089  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:23:35.090 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:23:35.092 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:23:35.093 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:23:35.094  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:23:35.149  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:23:35.150  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:23:35.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:23:35.152 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:23:35.154 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:23:35.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:23:35.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:23:35.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:23:35.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:23:35.287  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:23:35.288  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:23:35.288 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:23:35.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:23:35.293  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:23:35.349  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:23:35.350 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:23:35.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:23:35.351 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:23:35.352 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:23:35.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:23:35.353 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:23:35.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:23:35.355 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:23:35.356 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:23:35.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:23:35.363 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4c:ed:e8:0f:b8:7a:fa:16:55:dc:bc:9a:ce:b8:64:e0:d5:63:6c:4e]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:25:50.298  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:25:50.300 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:25:50.302 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:25:50.303 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:25:50.304  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:25:50.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:25:50.305  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:25:50.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:25:50.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:25:50.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:25:50.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:25:50.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:25:50.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:25:50.359 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:25:50.550  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:25:50.550  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:25:50.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:25:50.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:25:50.553  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:25:50.554  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:25:50.554 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:50.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:50.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:50.555 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:50.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:50.556 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:50.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:50.557 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:50.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:50.559 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:25:50.564 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [24:bc:29:aa:54:27:16:c6:5c:8c:95:50:c4:44:d4:68:26:17:09:e8]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:25:54.730  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:25:54.732 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:25:54.733 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:25:54.734 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:25:54.734  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:25:54.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:25:54.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:25:54.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:25:54.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:25:54.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:25:54.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:25:54.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:25:54.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:25:54.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:25:54.830  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:25:54.830  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:25:54.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:25:54.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:25:54.852  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:25:54.853  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:25:54.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:54.854 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:54.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:54.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:54.856 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:54.857 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:54.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:25:54.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:25:54.858 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:25:54.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:25:54.950 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [22:78:79:bd:de:76:70:e8:07:e4:03:09:21:e2:47:ae:2b:1b:d6:8b]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:26:26.354  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:26:26.355 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:26:26.357 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 15:26:26.357 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:26:26.357  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 15:26:26.358  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:26:26.359  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:26:26.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:26:26.359 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:26:26.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:26:26.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:26:26.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:26:26.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:26:26.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:26:26.526  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:26:26.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:26:26.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:26:26.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:26:26.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:26:26.552  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:26:26.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.556 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.557 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:26:26.560 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:56:21:b8:39:ea:0d:b2:42:cb:e5:99:9f:fd:d3:37:42:d3:70:db]
            modulus: c8dc3e47fc6203c76317b613925058ec89fa391ba8129494d6144122a6be45c6c7b0d7faaf96b4f427ed2988299ea2a1a5430138910dfdf65784baa140d77f23836cfd3326601075dfa799525e3bd0c867510fc0309010198827acf075bd3b86be0971c75dbede4f4a2171635125a42139b12b56d012bcd8356c268a87d01c020ad0a958e84e095816cb486eb404cbed7ec4eaf00ade597bb662cfec031762d09e1e97f997bd9378f1b5e7df2ef7fdf8de171e46d07d5548e0a9a23d6c2dfd1d3295362ae7b188ab939fece97391a5f804d9ae5d1ace698a3368fb79e3a79fa4923d7474e80353c5298aa039c4eae36f633d827ed4a7f66f58bb2f40a7936529
    public exponent: 10001

] 
2021-10-11 15:26:26.759  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:26:26.760 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:26:26.762 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 15:26:26.762 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:26:26.763  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-11 15:26:26.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:26:26.763  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:26:26.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:26:26.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:26:26.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:26:26.768 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:26:26.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:26:26.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:26:26.769 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:26:26.832  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:26:26.832  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:26:26.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:26:26.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:26:26.835  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:26:26.850  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:26:26.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:26:26.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:26:26.854 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:26:26.855 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:26:26.858 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [15:ce:c9:0a:1b:f6:51:0a:ed:d6:b1:60:ec:f9:71:4d:96:18:da:c7]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:27:00.908  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:27:00.909 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:27:00.911 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-11 15:27:00.911 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:27:00.912  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-11 15:27:00.912  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:27:00.912  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:27:00.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:27:00.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:27:00.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:27:00.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:27:00.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:27:00.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:27:00.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:27:01.049  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:27:01.050  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:27:01.050 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:27:01.051 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:27:01.052  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:27:01.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:27:01.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:01.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:01.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:01.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:01.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:01.055 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:01.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:01.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:01.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:01.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:27:01.060 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:5e:45:6b:41:52:9b:c7:b4:3e:d5:79:c7:27:c6:3c:85:c9:2b:17]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:27:38.042  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:27:38.042 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:27:38.043 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:27:38.044 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:27:38.044  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:27:38.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:27:38.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:27:38.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:27:38.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:27:38.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:27:38.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:27:38.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:27:38.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:27:38.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:27:38.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:27:38.184  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:27:38.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:27:38.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:27:38.186  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:27:38.186  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:27:38.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:38.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:38.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:38.188 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:38.188 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:38.188 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:38.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:27:38.189 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:27:38.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:27:38.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:27:38.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [03:5f:aa:c0:b7:89:e1:64:03:34:e9:00:c6:0b:89:bb:fa:5d:c4:52]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:28:47.101  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:28:47.102 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:28:47.107 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:28:47.108 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:28:47.108  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:28:47.109  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:28:47.109  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:28:47.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:28:47.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:28:47.110 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:28:47.116 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:28:47.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:28:47.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:28:47.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:28:47.248  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:28:47.249  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:28:47.249 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:28:47.250 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:28:47.251  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:28:47.252  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:28:47.252 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:28:47.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:28:47.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:28:47.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:28:47.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:28:47.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:28:47.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:28:47.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:28:47.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:28:47.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:28:47.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: bb27e198a4b2563503891a57aafcdc50b8903acdb1811fed5bd393766aafd38b86a4666d9eba61e6d15fffaa46b63f777b64fcd844a814df714c109868740ad9a0263f020e5074f8abe8a5cbac5bb612ee766c61c548b1d9e9cca4761107ac3f5e1ee08ea6699bce1aea272e6ab77d33b3e6962de9b9b135b0a9076a8536da5dc26de7adc4c20dd1c001c16d5a7c662ea39ae80779a8b1b2d31a7c12a1f30882802a7a30045e1f03d8e8b719bdf69747ecc361268efce6fe1b0bc9a6c3f9eabdbe4befb612bae511534aa996810423bd4d46cc886b1f5de46466e3cdf49a1b3f8e1d8a7a46b0bb4ad2e23d6f839ff7af4dfb7086322df7c5f6512b097298284c4f43550af9ee8c62858dc197911f6919ec5c92b9ced016b4ae51c2e2aa948dcac93f7ceb9bdd5ed421887040e0bd8ef291c133db1165977de103345bcec6bed9dc83f4074ea2b1ce11065b20c84fbf2580025012bbf2b31a8f4e711fde8eb45f3de3b51119c7eb713e3a23b9181ffe99828ea92cd4a019291237532ed588b7f5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:b5:81:b8:a6:bb:3a:b8:ba:cf:db:e6:88:aa:32:dc:01:42:8a:aa]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:31:38.939  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:31:38.941 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:31:38.944 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:31:38.945 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:31:38.946  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:31:38.946  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:31:38.947  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:31:38.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:31:38.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:31:38.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:31:38.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:31:38.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:31:38.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:31:38.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:31:39.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:31:39.055  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:31:39.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:31:39.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:31:39.057  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:31:39.058  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:31:39.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:31:39.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:31:39.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:31:39.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:31:39.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:31:39.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:31:39.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:31:39.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:31:39.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:31:39.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:31:39.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [84:57:39:5a:56:aa:96:21:2c:68:63:f3:60:e6:3e:fd:fe:a5:d0:e4]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:33:11.561  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:33:11.562 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:33:11.563 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:33:11.564 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:33:11.564  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:33:11.565  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:33:11.566  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:33:11.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:33:11.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:33:11.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:33:11.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:33:11.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:33:11.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:33:11.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:33:11.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:33:11.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:33:11.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:33:11.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:33:11.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:33:11.681  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:33:11.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:33:11.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:33:11.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:33:11.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:33:11.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:33:11.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:33:11.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:33:11.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:33:11.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:33:11.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:33:11.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:79:f0:ea:77:7a:44:19:52:87:25:f7:1b:1f:6c:75:e5:f3:b5:a0]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:34:08.965  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:34:08.966 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:34:08.967 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:34:08.968 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:34:08.968  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:34:08.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:34:08.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:34:08.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:34:08.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:34:08.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:34:08.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:34:08.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:34:08.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:34:08.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:34:09.143  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:34:09.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:34:09.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:34:09.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:34:09.146  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:34:09.146  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:34:09.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:09.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:09.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:09.147 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:09.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:09.148 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:09.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:09.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:09.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:09.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:34:09.153 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0e:6e:12:fa:66:36:7a:5d:c0:9d:c0:68:a0:65:00:35:1d:9a:0d:26]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:34:48.651  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:34:48.652 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:34:48.653 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:34:48.654 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:34:48.654  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:34:48.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:34:48.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:34:48.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:34:48.655 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:34:48.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:34:48.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:34:48.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:34:48.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:34:48.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:34:48.758  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:34:48.759  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:34:48.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:34:48.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:34:48.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:34:48.761  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:34:48.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:48.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:48.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:48.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:48.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:48.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:48.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:34:48.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:34:48.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:34:48.764 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:34:48.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f8:f3:88:07:5b:72:3a:52:b5:37:68:68:12:bb:47:7c:09:b5:4c:1a]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:37:47.300  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:37:47.301 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:37:47.302 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:37:47.303 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:37:47.304  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-11 15:37:47.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:37:47.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:37:47.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:37:47.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:37:47.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:37:47.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:37:47.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:37:47.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:37:47.311 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:37:47.406  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:37:47.407  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:37:47.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:37:47.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:37:47.412  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:37:47.412  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:37:47.412 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:37:47.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:37:47.413 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:37:47.414 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:37:47.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:37:47.415 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:37:47.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:37:47.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:37:47.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:37:47.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:37:47.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ab:b4:d0:18:1c:83:7b:60:bc:b3:69:20:f4:cc:e7:26:82:71:56:a2]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:39:27.739  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:39:27.740 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:39:27.742 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:39:27.743 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:39:27.743  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-11 15:39:27.744  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:39:27.744  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:39:27.745 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:39:27.745 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:39:27.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:39:27.750 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:39:27.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:39:27.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:39:27.751 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:39:27.846  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:39:27.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:39:27.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:39:27.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:39:27.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:39:27.849  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:39:27.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:39:27.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:39:27.850 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:39:27.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:39:27.851 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:39:27.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:39:27.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:39:27.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:39:27.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:39:27.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:39:27.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d1:06:6d:c2:78:9a:3f:ae:26:bf:e5:5c:86:20:c3:49:65:05:c7:e9]
            modulus: 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
    public exponent: 10001

] 
2021-10-11 15:41:15.738  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-11 15:41:15.739 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-11 15:41:15.740 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:41:15.741 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-11 15:41:15.741  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-11 15:41:15.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-11 15:41:15.742  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-11 15:41:15.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-11 15:41:15.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-11 15:41:15.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-11 15:41:15.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-11 15:41:15.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:41:15.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-11 15:41:15.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:41:15.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-11 15:41:15.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-11 15:41:15.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-11 15:41:15.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-11 15:41:15.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-11 15:41:15.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-11 15:41:15.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:41:15.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:41:15.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:41:15.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:41:15.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:41:15.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:41:15.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-11 15:41:15.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-11 15:41:15.849 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-11 15:41:15.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-11 15:41:15.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 405954925197206341718459166070646154421040016531
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 22:50:25 UTC 2021
           Final Date: Wed Oct 08 22:50:24 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [a3:ea:ae:1b:b4:9b:4d:cc:f8:f0:40:37:cc:6b:f8:dc:7a:18:a7:6c]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 6971b5bd6b7ad518b04620a9576621f5b5eb31a4
                       213170206559d9642e06fcb2d45938b3db983ed3
                       e15e7fe5678e0b4bfe9902157b2fe2368f97c5fc
                       94180afdd082aede1aa4d71a539542a90fbef26e
                       0d1506ba7d1a7a53ffcb914be3cc930ee3b18cd4
                       d297a6b4e5afc80fe89bc149012820d3b63c2cf1
                       f379388d75a9f5438ac1723234895fc443e2808e
                       9f79b349bf0fb3d2211b217ae458de1751a1b8da
                       762df12b2d22e6ec1b900c8054818f103ee8d3cf
                       de027983a119d1011ce097dec6ff7f75e3278c65
                       3dac379a98014b7f2c20f7323d84d84afe33a45b
                       92b50a6afe5d0d96cda83876595b9479e67d388c
                       d8cc3af65b0798f011d32c7bbb96ede16a2a7401
                       32b5d57170186a350bcaf827bc7f3c82a6b66194
                       b9feb813bea198c29880306263b53178162a44a3
                       df097f831fc14106981023cd1d95a816eee93779
                       f1ac6bde0432d0fb70622c0c358453a6930f7bd8
                       4f9ce18868bd6103821ad64150e05d272d443123
                       d079c0a53dd95f5194bb68e455785b0adac041f5
                       794252db
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:bc:f9:db:26:75:bd:34:1c:a8:68:3f:ff:dc:21:78:41:1c:c1:11]
            modulus: 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
    public exponent: 10001

]