Results

By type

          2021-09-14 06:12:32,706 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-09-14 06:12:33,470 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-09-14 06:12:34.194  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-09-14 06:12:36.941 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-09-14 06:12:37.195  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-09-14 06:12:37.367  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-09-14 06:12:39.498  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.412 seconds (JVM running for 9.198)
2021-09-14 06:20:32.140  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 06:20:32.152 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 06:20:32.203 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-14 06:20:32.209 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 06:20:32.246  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-09-14 06:20:32.250  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 06:20:32.251  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 06:20:32.253 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 06:20:32.254 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 06:20:32.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 06:20:32.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 06:20:32.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 06:20:32.308 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 06:20:32.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 06:20:32.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 06:20:32.326 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 06:20:32.978  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 06:20:32.982  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 06:20:32.982 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 06:20:32.985 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 06:20:32.996  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 06:20:32.997  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 06:20:32.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 06:20:32.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 06:20:33.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 06:20:33.015 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 06:20:33.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 06:20:33.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 06:20:33.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 06:20:33.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 06:20:33.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 06:20:33.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 06:20:33.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:1a:53:33:f2:6c:42:20:17:a9:ec:88:3b:d6:c4:fc:c3:f5:db:22]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:02:40.950  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:02:40.953 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:02:40.956 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-14 09:02:40.958 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:02:40.959  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-09-14 09:02:40.959  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:02:40.960  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:02:40.961 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:02:40.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:02:40.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:02:40.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:02:40.977 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:02:40.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:02:40.978 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:02:41.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:02:41.263  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:02:41.264 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:02:41.265 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:02:41.270  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:02:41.271  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:02:41.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:02:41.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:02:41.274 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:02:41.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:02:41.277 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:02:41.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:02:41.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:02:41.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:02:41.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:02:41.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:02:41.288 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [89:46:9e:37:56:9d:23:04:bc:d5:44:c4:c9:0a:d0:46:fc:01:d4:81]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:06:10.429  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:06:10.431 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:06:10.433 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 09:06:10.434 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:06:10.435  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 09:06:10.436  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:06:10.436  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:06:10.437 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:06:10.437 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:06:10.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:06:10.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:06:10.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:06:10.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:06:10.448 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:06:10.668  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:06:10.669  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:06:10.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:06:10.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:06:10.676  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:06:10.677  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:06:10.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:06:10.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:06:10.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:06:10.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:06:10.680 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:06:10.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:06:10.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:06:10.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:06:10.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:06:10.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:06:10.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: ada87e54e51b316c812df373fce01bf1714e77a8116a3adfd7e51e180ec775f5d25efd8bc981c7838dabd67f5fe2b7bd901ac405fb719e7fb441f15268b6aef6dda76565b7427be68521179d79640c0ce1f953f9d67a1cc143a3772995a659b55ab52876b6c19c0757d07b80c188818955f06d050a663756f5e15f70083f8675d11461dfe421d79670a8753a83645ada3689cbbf24f1dd56d5c58249114eb0982b6b0684fcc9811709a172e1cf8fc4ca7eac5c9960657a62316ff6cebb1cb58fb968b38c7d302cc66daf341aa8e3bdaf1cd585d041b693e1bf1b90d6642ab0e67b26b50d75674a5396113e920bcac675719e9567172ef4501e81f036590732cef06af719bb85a8916f017e9cff66adfd14809e23b7cace4372324c948a28de413de9afe58864e6bcddd74104625a8bcb304d6a06ea70ca88c3ce93c65cd69921e4cabfad203966f3b39e961afbc9d9d32b310c52a6fb1523372a2fd4d54a10891cfcfc6c7f244c6b0cf6e7b8adb223a8e4ef40ce7d7ea5e2ae57fce23f2afc2f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:d1:1e:b5:59:6f:fc:43:e3:9f:e2:17:e4:c5:42:46:28:89:7f:a9]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:07:37.314  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:07:37.321 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:07:37.325 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:07:37.326 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:07:37.327  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:07:37.327  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:07:37.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:07:37.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:07:37.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:07:37.329 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:07:37.335 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:07:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:07:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:07:37.336 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:07:37.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:07:37.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:07:37.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:07:37.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:07:37.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:07:37.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:07:37.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:07:37.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:07:37.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:07:37.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:07:37.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:07:37.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:07:37.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:07:37.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:07:37.558 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:07:37.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:07:37.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [92:c7:76:ce:09:89:55:6c:ee:52:98:aa:0d:d2:14:35:0b:cb:8b:a1]
            modulus: a9f7d92d6ab770676c88e6f48080713c670f31516dc3c4cdeccad83115a0a63bffdabe3ee402b63e6cbadf03a392e54f79ad7af803573c7ce7443e639a82e176fe1eea6c606ec927196e65ab7ba1603c5a60473298da5f093cd3f0d34f805b6bc2a22a946a81207299e4e6693f1a4660ce7a607877d5518314caf0501bff37aa761cd0bbf8dc0e902debb42a4cd68f3779e0ace25b89676365763329132b70caf21cefa9e65e0cc395aabdc7a6ad5066f98e34784df3e342c2b8220e11cc6189f9f040793f0e566b395cb65053702f93c81d0ebf720e53d071f23ab35a456733873ba2a5d4da44a8843e61e3a72970b510eb42f6d65265ce0256e83cf89b6051
    public exponent: 10001

] 
2021-09-14 09:08:06.805  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:08:06.809 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:08:06.811 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-14 09:08:06.812 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:08:06.813  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-09-14 09:08:06.814  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:08:06.814  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:08:06.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:08:06.815 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:08:06.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:08:06.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:08:06.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:06.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:06.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:06.977  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:08:06.978  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:08:06.978 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:08:06.979 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:06.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:08:06.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:08:06.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:06.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:06.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:06.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:06.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:06.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:06.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:06.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:06.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:06.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:08:06.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:6b:4d:e6:bc:3b:8f:85:46:22:a6:95:e7:3e:39:ca:c7:ea:16:85]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:08:17.501  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:08:17.502 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:08:17.504 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:08:17.505 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:08:17.505  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:08:17.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:08:17.506  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:08:17.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:08:17.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:08:17.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:08:17.515 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:08:17.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:17.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:17.516 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:17.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:08:17.704  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:08:17.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:08:17.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:17.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:08:17.706  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:08:17.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:17.707 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:17.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:17.708 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:17.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:17.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:17.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:17.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:17.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:17.712 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:08:17.716 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f2:17:6d:bd:e8:f9:ee:ec:7c:b9:06:78:f8:59:ac:f6:e7:26:94:7d]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:08:46.377  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:08:46.378 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:08:46.380 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-14 09:08:46.381 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:08:46.381  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-09-14 09:08:46.382  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:08:46.383  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:08:46.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:08:46.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:08:46.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:08:46.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:08:46.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:46.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:08:46.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:46.629  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:08:46.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:08:46.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:08:46.631 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:08:46.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:08:46.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:08:46.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:46.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:46.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:46.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:46.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:46.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:46.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:08:46.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:08:46.636 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:08:46.637 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:08:46.641 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e0:f4:1e:62:a7:9b:22:ba:37:1f:97:c7:ac:ac:93:51:5c:45:0f:86]
            modulus: d6d17ea70e186bea0fd9e29eab3af64c01dcf906facbdd6ace772a95a2b459a12fcc04e83335fea94624860bcecabd8b02b2b259c0a97450de66d63e769212c373b38832917ed7b55677d1e5957a0462a944a7ffd87d7de98f0f73c3a30d6de74adeb6c23ba7acd9207216b01f3d070dcc739a11877aefec0d41faaf4a46b33e658300b436410208332cb6e40f349f1e9855fb5f7c144e06f4943d0eca6f89f6ddd8b1c13236f18890a65502e0cfaab0fb3300ce97f0c84a8dc703377aba91dc322fde8de0a266124b7b12fa41134c269d6620d04a12ee6249b84da1d7ff3b231659d5c29d1f12ed30e32e7ce00d74b37e4c930166d72c2eccd282dcab3a6289
    public exponent: 10001

] 
2021-09-14 09:10:31.524  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:10:31.526 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:10:31.530 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 09:10:31.531 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:10:31.531  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 09:10:31.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:10:31.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:10:31.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:10:31.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:10:31.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:10:31.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:10:31.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:10:31.546 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:10:31.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:10:31.775  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:10:31.776  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:10:31.776 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:10:31.777 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:10:31.778  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:10:31.779  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:10:31.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:31.779 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:31.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:31.780 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:31.783 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:31.784 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:31.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:31.786 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:31.787 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:31.789 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:10:31.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:c8:4a:f7:e7:02:6c:55:15:39:a5:a3:64:92:b8:45:20:c2:ea:99]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:10:48.676  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:10:48.679 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:10:48.681 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 09:10:48.682 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:10:48.682  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-09-14 09:10:48.683  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:10:48.684  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:10:48.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:10:48.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:10:48.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:10:48.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:10:48.697 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:10:48.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:10:48.698 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:10:48.933  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:10:48.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:10:48.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:10:48.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:10:48.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:10:48.936  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:10:48.936 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:48.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:48.937 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:48.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:48.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:48.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:48.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:10:48.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:10:48.940 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:10:48.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:10:48.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [40:b9:d1:42:d0:3d:ea:19:66:2f:2b:98:a4:39:c2:c5:e7:0c:43:94]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:12:32.099  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:12:32.101 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:12:32.104 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:12:32.104 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:12:32.105  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-09-14 09:12:32.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:12:32.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:12:32.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:12:32.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:12:32.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:12:32.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:12:32.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:12:32.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:12:32.117 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:12:32.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:12:32.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:12:32.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:12:32.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:12:32.309  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:12:32.310  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:12:32.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:32.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:32.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:32.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:32.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:32.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:32.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:32.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:32.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:32.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:12:32.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [35:45:d5:b5:c8:dc:05:2d:65:d9:2f:d9:3c:5b:8f:9a:9c:fd:9d:69]
            modulus: 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
    public exponent: 10001

] 
2021-09-14 09:12:44.267  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-09-14 09:12:44.268 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-09-14 09:12:44.270 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 09:12:44.271 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-09-14 09:12:44.272  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-09-14 09:12:44.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-09-14 09:12:44.273  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-09-14 09:12:44.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-09-14 09:12:44.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-09-14 09:12:44.274 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-09-14 09:12:44.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-09-14 09:12:44.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:12:44.280 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-09-14 09:12:44.281 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:12:44.502  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-09-14 09:12:44.503  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-09-14 09:12:44.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-09-14 09:12:44.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-09-14 09:12:44.507  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-09-14 09:12:44.508  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-09-14 09:12:44.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:44.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:44.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:44.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:44.511 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:44.512 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:44.513 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-09-14 09:12:44.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-09-14 09:12:44.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-09-14 09:12:44.516 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-09-14 09:12:44.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 108952262023508969118410707052773539334796702783
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Tue Sep 14 06:10:05 UTC 2021
           Final Date: Sun Sep 14 06:10:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [f3:cb:0d:55:ca:f4:7d:fd:8c:3e:4c:3f:bb:f5:d4:ee:08:26:18:4b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 50f98b9eb85fbab0612800f8140623040b4fdcae
                       38bd930a2ed18385017a3b480013240d6b9822c0
                       16476f2540ccf3259cc2bd74dc08780720e339b0
                       dde3e6f1c72148c4ead0076191974c9ebc1c9d97
                       4a3f351720bc4b63d38505f41833a787daaa856f
                       720bc541e28102ae45969f6a786ed81c10d39276
                       995faa3c1d04f2de42609791d3b7f812b063c3bd
                       3215bd74d989be3dbf1b5768c45bc603b813be81
                       659b9e3ae9e995afed54d027487e604f74935336
                       5ea2c4cf593971535a84a61903c070d669f584d2
                       d3db7bd8228a751ad6d923435559c51fa4ba1c60
                       037ba2083ce7d15ea98e0742676f671721f865b0
                       19a8aa7e3f9e01178022a9da8f3f5d3c3322a0e2
                       26fd75affe9d4d2c77dd6d1d5f2f6d628646d62f
                       49c897bbe53fa6241a1814d87c427f8c5e4338c5
                       eb8bd523278641051a1023853bac35c158b52a47
                       2bc1d01b58ee475caa5b089a5b08130d8d61565e
                       07c708be2698071406a36e023e67eaacf750aff3
                       9e526e2274008a1ea9573f00def8651536a3af16
                       c9744fcb
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:8f:e2:05:6a:67:58:a3:e1:0c:e8:d0:6c:46:cf:ed:64:a8:64:12]
            modulus: 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
    public exponent: 10001

]