Results

By type

          2021-10-08 06:12:09,851 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-08 06:12:10,802 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-08 06:12:11.619  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-08 06:12:14.483 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-08 06:12:14.780  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-08 06:12:14.969  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-08 06:12:17.315  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.086 seconds (JVM running for 9.939)
2021-10-08 06:13:09.051  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:13:09.063 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:13:09.125 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 06:13:09.132 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:13:09.152  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 06:13:09.155  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:13:09.156  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:13:09.159 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:13:09.160 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:13:09.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:13:09.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:13:09.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:13:09.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:13:09.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:13:09.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:13:09.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:13:09.857  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:13:09.863  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:13:09.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:13:09.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:13:09.881  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:13:09.883  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:13:09.884 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:13:09.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:13:09.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:13:09.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:13:09.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:13:09.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:13:09.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:13:09.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:13:09.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:13:09.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:13:09.939 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ac:1e:b1:d7:79:5f:15:3d:36:36:49:9d:86:b7:e0:f3:8f:52:ff:c9]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:26:04.377  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:26:04.381 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:26:04.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 08:26:04.385 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:26:04.386  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 08:26:04.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:26:04.388  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:26:04.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:26:04.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:26:04.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:26:04.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:26:04.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:26:04.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:26:04.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:26:04.593  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:26:04.594  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:26:04.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:26:04.595 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:26:04.598  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:26:04.599  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:26:04.599 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:26:04.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:26:04.600 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:26:04.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:26:04.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:26:04.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:26:04.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:26:04.603 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:26:04.604 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:26:04.605 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:26:04.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:ae:10:13:67:ef:16:56:a4:57:19:50:d1:9c:8e:f2:c9:04:b4:85]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:27:57.175  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:27:57.180 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:27:57.184 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:27:57.187 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:27:57.188  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:27:57.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:27:57.190  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:27:57.191 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:27:57.192 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:27:57.193 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:27:57.200 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:27:57.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:27:57.202 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:27:57.203 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:27:57.402  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:27:57.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:27:57.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:27:57.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:27:57.409  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:27:57.410  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:27:57.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:27:57.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:27:57.412 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:27:57.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:27:57.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:27:57.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:27:57.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:27:57.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:27:57.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:27:57.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:27:57.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5d:6c:62:5d:7e:57:30:e2:8b:a2:02:c2:a5:b9:c6:ba:c7:01:27:e3]
            modulus: c8c1865c87d1cd7631a22d6b2487d8ca4bd1c90aced85670ecf98915b7b285a42a9bb232a5f4f40cb7cc7c0eb39d465aa3737f48f5c804a832485c951096ef173c5a96a6136ab3cb222ff8f2d5d92af179da4f111b026781d46080a5c9a479e720c0522b6742d34be60cf66e72fafad9cfcde80f45c4914bf641032e462f8ff2b4900cc1ea63d42b4b7b746ff71856effea2bbe13c1fe35af5115598f0dc607f6d50bbd974861e4d7f4eac174a8ec361570ae9b72c556504dfdf35ba534a4fafca5a2ffbef23db643b16150b752d84d510a1ff8980c2d79b5a8f271e19a98b6c6392f40cef2120100b44ee3db7c28359e88ca6fde453088d15cfab94e99f8677
    public exponent: 10001

] 
2021-10-08 08:32:27.243  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:32:27.247 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:32:27.250 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:32:27.252 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:32:27.254  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:32:27.255  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:32:27.255  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:32:27.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:32:27.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:32:27.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:32:27.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:32:27.274 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:32:27.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:32:27.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:32:27.435  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:32:27.435  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:32:27.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:32:27.436 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:32:27.439  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:32:27.440  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:32:27.441 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:32:27.442 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:32:27.442 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:32:27.443 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:32:27.444 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:32:27.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:32:27.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:32:27.446 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:32:27.447 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:32:27.448 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:32:27.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b4:63:34:5e:84:3e:97:17:e9:08:cb:d2:ce:38:d8:0c:bd:7f:8a:33]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:36:53.559  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:36:53.567 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:36:53.581 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 08:36:53.583 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:36:53.584  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 08:36:53.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:36:53.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:36:53.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:36:53.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:36:53.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:36:53.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:36:53.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:36:53.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:36:53.598 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:36:53.791  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:36:53.792  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:36:53.792 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:36:53.793 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:36:53.794  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:36:53.794  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:36:53.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:36:53.795 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:36:53.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:36:53.796 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:36:53.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:36:53.797 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:36:53.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:36:53.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:36:53.798 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:36:53.799 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:36:53.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:2e:55:1e:67:49:36:b5:0b:97:ac:ca:bc:8a:65:8f:d6:08:2a:ec]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:39:04.292  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:39:04.295 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:39:04.298 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:39:04.303 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:39:04.304  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:39:04.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:39:04.305  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:39:04.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:39:04.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:39:04.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:39:04.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:39:04.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:39:04.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:39:04.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:39:04.451  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:39:04.453  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:39:04.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:39:04.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:39:04.457  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:39:04.458  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:39:04.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:39:04.459 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:39:04.460 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:39:04.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:39:04.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:39:04.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:39:04.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:39:04.463 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:39:04.464 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:39:04.465 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:39:04.469 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [08:49:1a:9c:d5:ac:be:ae:97:ac:1c:28:19:cd:ba:32:1b:b6:bf:f4]
            modulus: 9a6c3c6b2fca25694da74df7980b8bb3e138f85f4502b012e6df76dcfa853679ff77761398c4c7a2df934e7f73a8679fb0a208a5b1b8f6d7323509acca617be174c4422cd8b419de7347f060673644a4e11de1a37b716e75ed8d2dada207aedfcd17ee22bc15f9776d6d70a0f05c3cf8a3eca9d5403d30736f009813fb6ba9554017e200031061ff3fb5fb30f91c8d50ec12d2eacfc7e9b611b3e3052820adc4da7ff50025f0b9ec31e150f0c44335dd2635abe2d95d5aef208860b9d84e6c3730472be490c738fd5ffdb2b448137660a90194fa45a4ebb681986e0fb819f16f546b0848fb746f70b24a7e5aa9e3d6ba19e23e7e71b025d968a540f2761522c3
    public exponent: 10001

] 
2021-10-08 08:41:03.684  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:41:03.688 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:41:03.690 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:41:03.691 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:41:03.692  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:41:03.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:41:03.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:41:03.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:41:03.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:41:03.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:41:03.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:41:03.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:03.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:03.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:03.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:41:03.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:41:03.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:41:03.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:03.866  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:41:03.867  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:41:03.868 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:03.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:03.869 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:03.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:03.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:03.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:03.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:03.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:03.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:03.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:41:03.876 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:ba:e4:43:1b:9f:7d:8c:e9:91:01:f0:ad:66:5d:bf:93:3e:db:89]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:41:04.066  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:41:04.067 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:41:04.069 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:41:04.070 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:41:04.070  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:41:04.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:41:04.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:41:04.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:41:04.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:41:04.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:41:04.084 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:41:04.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:04.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:04.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:04.185  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:41:04.199  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:41:04.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:41:04.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:04.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:41:04.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:41:04.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:04.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:04.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:04.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:04.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:04.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:04.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:04.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:04.207 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:04.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:41:04.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:be:9b:4a:96:2d:ed:ca:85:46:1d:ec:b6:aa:a2:3e:98:1b:b1:26]
            modulus: b44cc97e57a801248a3ea0bfc8c51b690ae46169b76d56c591b81c108a57286cd176744bc58436b0842ea844245e85cd86f1258f38b89f478705a191332bc77dbdbd5cb2cfec3a29abd602101036f9a58dc920d13b7234db12bfdfa1eb4878a20c01399fd681048b0f5d90872af97d6942bc98fb84837fdc0a78e8bcaebe4dfa6a464bae8006ff3cd029eb361836a17f60d97b2d47c010c5df3cd836120b2c0cdc592f2c050a0ae27f105f5c5aa710c3593dbef00c76bf3de09ceff30b60ca59217e360a590e3792929d792a4620f92711ac7dbce191f43278f5ae40a0e1c6c848353e0dd977f755fadcb110bc90b914330b2c0d9406313bc413e35ecbdbadfb
    public exponent: 10001

] 
2021-10-08 08:41:36.954  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:41:36.959 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:41:36.961 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-08 08:41:36.963 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:41:36.964  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-08 08:41:36.965  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:41:36.966  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:41:36.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:41:36.969 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:41:36.970 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:41:36.979 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:41:36.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:36.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:41:36.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:37.157  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:41:37.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:41:37.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:41:37.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:41:37.161  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:41:37.162  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:41:37.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:37.163 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:37.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:37.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:37.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:37.166 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:37.167 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:41:37.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:41:37.168 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:41:37.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:41:37.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [58:d5:d5:18:cd:3d:9d:52:b1:73:03:c3:55:88:07:76:97:48:d1:fc]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:42:04.963  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:42:04.970 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:42:04.971 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-08 08:42:04.972 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:42:04.972  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-08 08:42:04.973  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:42:04.973  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:42:04.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:42:04.974 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:42:04.975 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:42:04.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:42:04.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:42:04.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:42:04.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:42:05.105  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:42:05.107  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:42:05.108 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:42:05.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:42:05.111  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:42:05.112  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:42:05.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:42:05.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:42:05.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:42:05.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:42:05.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:42:05.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:42:05.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:42:05.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:42:05.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:42:05.120 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:42:05.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:2a:87:10:f4:73:71:e8:bc:93:a1:ec:ff:7b:a2:80:94:cc:72:90]
            modulus: a355d15057f14036d0adbf9ac3595bb8843000957f12019ccdbc5bc47ed518aeb19d8ceec54c25a9dcca7ac3cc1fb90bbc4d8dcbd252dbb95899af34647dd9687b50c1e2164ed17d5a4ee725c94551c21f264f4b2e5cc8dea7f98faf4dd54f611abf053f373ae940525a664685e1694afe7f9452b8987cf67cda7e33e2fbd3a0f79b7c280aa9ffbe77cb60a0485e3c4f0a78950d8a9440c9c7d210e12b9768e5c5e879fc06b0fa159f5965f5af0e38393843ebf263eb663552875da103640552ddc5b8d1d31516266302129eb8d50d73c0f284ce0645a9947d83d67c32cb603ba3d7692155272e6e0ecefa62ffe2baeb614064281b59d4ec30b32384365e554b
    public exponent: 10001

] 
2021-10-08 08:44:11.050  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:44:11.063 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:44:11.065 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:44:11.066 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:44:11.066  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:44:11.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:44:11.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:44:11.067 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:44:11.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:44:11.068 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:44:11.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:44:11.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:44:11.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:44:11.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:44:11.250  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:44:11.251  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:44:11.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:44:11.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:44:11.253  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:44:11.254  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:44:11.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:44:11.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:44:11.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:44:11.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:44:11.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:44:11.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:44:11.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:44:11.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:44:11.259 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:44:11.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:44:11.263 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7d:63:91:09:9b:71:da:30:33:ce:ad:9d:6c:14:10:80:52:dc:6c:2a]
            modulus: c25dfa184351b63715fed83ef62522470f22a2d41f4d63f09703a6fc65cbff1c901b526ccbaccd1771a271c5a0d02cfd1fc38fc1611e0c7767f7f99009ba574aa7915569d1f89ddbf62f0d2de82eb86ac6869b326773939d9cf6d8e71c487cbc617df3f14ecff4fc9bc4af6ba90de0caba763f5ad1f9f7f5c24e9d90ad2afca2e739c7b26103c39008f63fcfcf7bac56db3e37dd845095bb0b9dbdc47462a6af9fd334a5beddb265f21aef508e5d287a7df2290098d45ad2480f8b4df30e880d38ca9a6142bec2da7379897ec2a4caa11300ecd5278e8b54e8072b689a38906ee336e1756252d89a4e6086e43807ee46b06f8d4041949591f3d72d58a2242f3f
    public exponent: 10001

] 
2021-10-08 08:46:04.964  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:46:04.967 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:46:04.969 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:46:04.970 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:46:04.971  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:46:04.972  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:46:04.972  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:46:04.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:46:04.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:46:04.974 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:46:04.979 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:46:04.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:46:04.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:46:04.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:46:05.159  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:46:05.160  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:46:05.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:46:05.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:46:05.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:46:05.163  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:46:05.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:46:05.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:46:05.164 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:46:05.165 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:46:05.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:46:05.166 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:46:05.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:46:05.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:46:05.167 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:46:05.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:46:05.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:10:40:17:06:3d:62:33:f2:35:93:88:08:5f:53:7f:9a:84:d2:f6]
            modulus: a34c56554cc99bf80bbacefa7d821db5fe59b301cbfdb2cf0c0521c9c2b06068c8a007f18967944871170a364d88561d7e9ffef081c74877a5d034b6050440b5936664c6caddd396f8ca2cf0659a3fe93072460025e5c2c2a208d088b324542789868177b18bcf8abb879b09aba9e9ab288dcb5c80aa057b6d65622c54914b7c683f9b5e6d0049375d82c981bac273998022a46155363ad7986639de9641cd2d161563d9023c260cc4e54967b902fe13ea6c49a201013984d74fc54961d3ad26f380f12f9f4eea1b5b0e4ea72ecf8331c127d216776a572538f93d7ce086d849268ec2727b29fe3fb5605c51c9d8fe42b5999d8796dadae469691d8c889c1dd5
    public exponent: 10001

] 
2021-10-08 08:47:42.343  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:47:42.348 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:47:42.350 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:47:42.352 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:47:42.353  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:47:42.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:47:42.354  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:47:42.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:47:42.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:47:42.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:47:42.361 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:47:42.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:47:42.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:47:42.363 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:47:42.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:47:42.537  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:47:42.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:47:42.538 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:47:42.539  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:47:42.540  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:47:42.540 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:47:42.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:47:42.541 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:47:42.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:47:42.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:47:42.542 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:47:42.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:47:42.543 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:47:42.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:47:42.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:47:42.548 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [47:90:97:94:8b:13:20:85:85:b3:06:d8:9f:af:23:55:9a:89:c5:82]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:49:32.722  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:49:32.725 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:49:32.727 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:49:32.729 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:49:32.729  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:49:32.731  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:49:32.731  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:49:32.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:49:32.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:49:32.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:49:32.740 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:49:32.740 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:49:32.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:49:32.741 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:49:32.888  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:49:32.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:49:32.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:49:32.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:49:32.892  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:49:32.892  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:49:32.893 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:49:32.893 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:49:32.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:49:32.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:49:32.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:49:32.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:49:32.896 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:49:32.896 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:49:32.896 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:49:32.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:49:32.905 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:81:ee:4b:3a:4b:f6:18:39:0e:e3:b1:0f:e9:3d:35:c1:88:5c:ac]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:51:37.356  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:51:37.359 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:51:37.361 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:51:37.362 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:51:37.364  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:51:37.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:51:37.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:51:37.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:51:37.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:51:37.367 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:51:37.372 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:51:37.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:51:37.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:51:37.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:51:37.548  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:51:37.549  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:51:37.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:51:37.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:51:37.551  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:51:37.552  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:51:37.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:51:37.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:51:37.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:51:37.553 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:51:37.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:51:37.554 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:51:37.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:51:37.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:51:37.561 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:51:37.564 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:51:37.570 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [45:ae:49:90:2c:6a:04:71:1f:59:d0:fa:ca:c6:2e:c2:41:98:36:b6]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:55:13.899  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:55:13.902 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:55:13.903 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:55:13.904 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:55:13.905  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 08:55:13.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:55:13.906  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:55:13.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:55:13.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:55:13.907 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:55:13.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:55:13.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:55:13.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:55:13.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:55:14.092  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:55:14.093  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:55:14.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:55:14.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:55:14.095  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:55:14.095  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:55:14.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:55:14.096 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:55:14.097 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:55:14.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:55:14.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:55:14.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:55:14.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:55:14.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:55:14.101 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:55:14.101 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:55:14.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: d76f3b256478c4dec04d6e704fa634131d20470b088d7a6307e4dd434dc9db340b2fd42557683b0b6baa5bc6d5333b082f3ebe100544ad736063310c8de555072d2030dc1b55a44abc6ec3bbf027e9ad559d653e8b02676ae753ec407dc9e14f8561e9695068a695619af7ea3bfe6ce1c6c6b62544c39ed53f212232acb9f5833025fb8add2502d4f1a740df382b5299705a6d23104b2503b1169d701317a7fc28ebddaa0b21aab2c9cec03091cff989a3f0b191e47199b295934bf8b7ace6bfabc68324b89579be634f4133650659c0986d87ae49ff19b7629480c1019e031f309273e9f2f34ff6d647b40dfe9e6ac1ac4e06dbeda0f90c7c770e4a7e72bc272538b1546eb0b19a417190d14c9718131fdbefe7a59e63c0665fcea2f3875ef9eef9ef9692655930a3679a7b6ae25fbce0f4f7438ad2713a462955f0dea8b8935390cfbd040a2adb6a2c951390d61d555489e4bf6d0a26f30d1f8ebb4e475cb27c0c70fc36676a906f5338ac27d5ebabeca431eedece79fa84d4b1522023cf43
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1c:bc:dc:d5:e3:ed:f5:83:6b:d7:a4:d6:97:34:92:e6:1c:f4:83:50]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:56:45.662  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:56:45.665 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:56:45.668 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:56:45.670 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:56:45.670  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 08:56:45.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:56:45.672  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:56:45.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:56:45.673 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:56:45.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:56:45.682 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:56:45.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:56:45.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:56:45.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:56:45.893  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:56:45.894  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:56:45.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:56:45.895 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:56:45.897  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:56:45.898  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:56:45.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:56:45.898 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:56:45.899 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:56:45.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:56:45.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:56:45.901 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:56:45.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:56:45.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:56:45.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:56:45.906 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:56:45.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:b2:c7:4d:43:c5:23:74:c2:5d:38:1b:78:ee:15:8b:79:7f:af:f3]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 08:59:04.806  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 08:59:04.809 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 08:59:04.813 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:59:04.814 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 08:59:04.815  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 08:59:04.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 08:59:04.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 08:59:04.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 08:59:04.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 08:59:04.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 08:59:04.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 08:59:04.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:59:04.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 08:59:04.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:59:05.004  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 08:59:05.005  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 08:59:05.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 08:59:05.006 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 08:59:05.007  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 08:59:05.018  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 08:59:05.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:59:05.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:59:05.020 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:59:05.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:59:05.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:59:05.022 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:59:05.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 08:59:05.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 08:59:05.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 08:59:05.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 08:59:05.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 536912771815505287252083537426469429855908649148
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 06:08:08 UTC 2021
           Final Date: Wed Oct 08 06:08:07 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [86:d4:6d:3f:82:9a:cb:e2:ba:d5:ee:18:98:29:a3:d1:30:c1:1c:eb]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a546fc663e26c403bc07c17a93084c80aadf8910
                       5b9e24d1fb2ada3d0fa00fc9ddb2f7def5f75dfd
                       bcbaf7ca3ca3c08b95ddbc386b0cb9b300c9c4b0
                       3af57f502c938c5f6edf272dde30a4d272aca109
                       51db6da606b1879d55158802fb033355c4719cd6
                       f59451b9f113b8f9fbbdadf7b53b963437603754
                       b5ba0f8f7ffc91ee43fde617d26e58062aa969f5
                       ce2f3010dd3761e033006680ed39fe766a3fb132
                       55ea6527df087bef5d2c9c92da250c50aaf62744
                       e2bc4d5f4ad0c9e6cf67f23abaa649e1860007f8
                       c67a241e4da6ab37916b653fd2c472a28a976a74
                       fc3b61af7d1b8037d2d69a9bb3233dfd195015da
                       95e9426f426b5adc62ad8ab3e93ebf9aaaa07e08
                       b99b20eb9a79f73d88e9866e7c943794a5bb0aeb
                       5f72a65d29649c8326ea125f0a415511ce2e526b
                       52c8b78d2d9e6bea48a03bc89ad7c7e77520f639
                       89eb2e6df0a1f3236f49ed261b446269a4f86cd7
                       53bb1d7bea274fe20e1e0723d0e5b2519ee0b690
                       f2a6bd63d5400ce2f07f856b4dc76f97ead805f9
                       1a316532
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:cc:35:dd:79:ef:62:a3:0c:88:54:8a:de:b1:0b:63:f7:1e:97:b2]
            modulus: cc160ab1b60ee8e686735020071952531daac601a8e6c7e189ea43eb2780093821359869ebaecb06bdae4cb8913e398b558609fab0567a46fa0c36c1f3cb7f18f0e71863e986b2a97d638eb1c8b2aa94db5a8fea7e13c50dc1acbd6e99d323fa8b7e7a9093daf9a9a63acfca80687d8fad22b78ea727e273ce8048cc0ec801251d9a491537dfc40de475f6ac277fa011a9a2ba06360a76e13590d1585124ef116d151a778dc06f3fcca3ae888b5ddd4efe61945f6af3f5832d6045bc0a4c81872fe1197859ca87e7ccbc1ea8f45ad94f3605bd1067561a6850199c94c2ddec2a794f989a3bc613e69ebb5238988c2824625518a848223543b4c2a8843be6a721
    public exponent: 10001

]