Results

By type

          2021-11-10 02:43:44,714 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-10 02:43:48,904 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-10 02:43:51.615  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-10 02:44:05.604 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-10 02:44:06.898  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-10 02:44:07.697  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-10 02:44:19.899  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.784 seconds (JVM running for 45.739)
2021-11-10 02:44:44.722  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 02:44:44.812 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 02:44:44.928 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-10 02:44:44.997 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 02:44:45.098  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-10 02:44:45.104  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 02:44:45.105  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 02:44:45.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 02:44:45.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 02:44:45.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 02:44:45.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 02:44:45.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 02:44:45.408 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 02:44:45.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 02:44:45.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 02:44:45.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 02:44:47.265  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 02:44:47.268  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 02:44:47.268 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 02:44:47.270 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 02:44:47.301  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 02:44:47.303  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 02:44:47.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 02:44:47.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 02:44:47.305 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 02:44:47.399 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 02:44:47.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 02:44:47.400 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 02:44:47.410 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 02:44:47.411 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 02:44:47.411 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 02:44:47.413 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 02:44:47.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:5d:de:d6:1c:83:8b:d7:de:6a:17:11:de:b0:46:f6:4b:0b:9a:a8]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:38:49.000  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:38:49.003 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:38:49.006 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-10 06:38:49.008 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:38:49.010  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-10 06:38:49.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:38:49.012  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:38:49.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:38:49.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:38:49.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:38:49.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:38:49.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:38:49.108 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:38:49.109 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:38:49.277  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:38:49.296  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:38:49.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:38:49.297 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:38:49.302  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:38:49.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:38:49.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:38:49.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:38:49.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:38:49.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:38:49.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:38:49.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:38:49.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:38:49.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:38:49.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:38:49.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:38:49.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [85:94:1b:ed:60:10:02:62:cf:ef:bc:f6:e6:2e:ae:4f:7f:d1:7a:be]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:40:26.601  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:40:26.602 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:40:26.603 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 06:40:26.604 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:40:26.604  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 06:40:26.605  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:40:26.605  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:40:26.605 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:40:26.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:40:26.606 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:40:26.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:40:26.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:40:26.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:40:26.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:40:26.685  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:40:26.696  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:40:26.696 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:40:26.697 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:40:26.700  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:40:26.701  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:40:26.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:40:26.702 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:40:26.703 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:40:26.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:40:26.704 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:40:26.705 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:40:26.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:40:26.706 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:40:26.707 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:40:26.708 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:40:26.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [93:d3:c3:22:c6:f9:5e:54:6e:67:98:10:25:ff:89:be:2b:59:3e:f2]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:43:18.178  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:43:18.180 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:43:18.181 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 06:43:18.182 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:43:18.183  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 06:43:18.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:43:18.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:43:18.184 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:43:18.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:43:18.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:43:18.200 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:43:18.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:18.201 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:18.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:18.283  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:43:18.296  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:43:18.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:43:18.297 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:18.300  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:43:18.300  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:43:18.301 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:18.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:18.302 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:18.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:18.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:18.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:18.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:18.306 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:18.307 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:18.308 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:43:18.313 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:1d:ee:d9:bb:77:d1:02:bc:d9:96:33:af:f4:a4:8a:30:7d:8b:65]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:43:36.914  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:43:36.915 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:43:36.917 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 06:43:36.917 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:43:36.918  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-10 06:43:36.918  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:43:36.918  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:43:36.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:43:36.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:43:36.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:43:36.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:43:36.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:36.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:36.926 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:36.996  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:43:36.997  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:43:36.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:43:36.997 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:36.999  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:43:36.999  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:43:37.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:37.000 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:37.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:37.001 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:37.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:37.002 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:37.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:37.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:37.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:37.005 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:43:37.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0b:7d:0a:0d:30:bc:6a:2b:81:f7:66:66:df:f5:a6:cd:aa:bc:71:41]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:43:49.296  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:43:49.297 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:43:49.298 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-10 06:43:49.299 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:43:49.299  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-10 06:43:49.299  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:43:49.300  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:43:49.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:43:49.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:43:49.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:43:49.304 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:43:49.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:49.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:43:49.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:49.396  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:43:49.397  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:43:49.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:43:49.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:43:49.399  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:43:49.399  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:43:49.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:49.400 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:49.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:49.401 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:49.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:49.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:49.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:43:49.403 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:43:49.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:43:49.404 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:43:49.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: a75cd8bedd009dab51dfb568bb1a7cc0f1dd52c561d29da4efdaba958dc75c0bc219fefa9c859372eefe093d1d5c2993700df6092f4d88d94b8703125a45bd0627795c742160d72a3f6c63b3f866be9a0eca95a93cd528d2ae774c349663fd17fb9fd17d93b21fa4b35b65c5a16911b511ad975bb9cea109ec74ed6e4f1216a3378f9875a95979cf178baeca471db5cc37148bed124308718877afde517a6819a9241be92a167259e9bcd13d33f73bc8d2a54a1ffa99655f9168c1d2c1d33d0db9ff41b384f525f0b73e97aa9786a5e2a8addbc2828e610e828421ec307f6f085c2c5644289535e6a87d69ee4ad65b175ce24e68887adb1871dae9f2b1617187aab2ad417b521f7036c621c90a8b88e9075b1e1c227a924465ecbd0b70e9ef6f618d46c1ad5aeb36d0cc991339a0df4b3fc85bb9a6f58dd5ef98516f771d0821119c662557362bbdfe3f8f8ed7acc4bf7e27d4fa0c8d75309c261c27ae1d53a25ec1169f5b8742c83a55e2546cd53603556eff99245aea0e036e18640ebebbdb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3a:3d:7b:4e:af:e0:67:13:98:0e:06:ba:9b:d7:5c:0f:5e:0e:a8:02]
            modulus: b3b1f6beadd67c83acdcac12ce911053a341b93ca9b14efe567ae4be25d4b926593be85af8df30649f4ab4f4283eeedd9354b97f77ac3d4751f4b4516760121d07cd8584dd24aca6df328a1fbc6d1520e7cedcfdf3221082baf9482a2736b71fa15c3c3b9217e13d5b57b55e862e1d3a8922ae0267e5eb8158a0d104f6b934d6698fdc954318529d820ba36af376913f09ee8c762e8f6b54d24085c7506aa06cfa2262f8e72c3d11c4ae54ee794c4efb5ff75834f2bb728d0e57bbe1b059f055dfcfa97e3f45b1498e74103fa5b9ef05d8cc14b5d4f57c735d8e5b164cde80ee2ed430c3a4411bc01504fd4e1ae9a00c78948b596ea8e8fb1db7a095f6d2153b
    public exponent: 10001

] 
2021-11-10 06:44:23.176  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:44:23.177 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:44:23.178 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-10 06:44:23.179 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:44:23.179  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-10 06:44:23.179  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:44:23.180  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:44:23.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:44:23.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:44:23.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:44:23.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:44:23.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:44:23.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:44:23.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:44:23.296  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:44:23.297  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:44:23.297 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:44:23.298 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:44:23.299  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:44:23.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:44:23.300 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:44:23.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:44:23.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:44:23.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:44:23.302 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:44:23.303 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:44:23.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:44:23.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:44:23.304 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:44:23.305 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:44:23.307 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:d8:67:71:95:dd:01:f4:6e:a3:98:17:01:7f:c8:9b:cc:f9:9e:e0]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:45:09.796  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:45:09.798 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:45:09.799 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-10 06:45:09.800 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:45:09.801  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-10 06:45:09.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:45:09.801  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:45:09.801 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:45:09.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:45:09.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:45:09.809 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:45:09.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:45:09.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:45:09.810 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:45:09.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:45:09.873  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:45:09.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:45:09.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:45:09.896  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:45:09.897  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:45:09.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:45:09.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:45:09.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:45:09.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:45:09.899 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:45:09.899 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:45:09.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:45:09.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:45:09.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:45:09.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:45:09.904 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:e7:98:cc:17:4d:71:f0:68:c2:be:d2:97:61:fb:40:5e:89:55:3d]
            modulus: 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
    public exponent: 10001

] 
2021-11-10 06:46:07.119  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-10 06:46:07.120 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-10 06:46:07.121 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 06:46:07.121 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-10 06:46:07.122  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-10 06:46:07.122  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-10 06:46:07.123  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-10 06:46:07.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-10 06:46:07.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-10 06:46:07.123 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-10 06:46:07.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-10 06:46:07.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:46:07.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-10 06:46:07.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:46:07.260  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-10 06:46:07.261  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-10 06:46:07.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-10 06:46:07.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-10 06:46:07.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-10 06:46:07.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-10 06:46:07.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:46:07.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:46:07.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:46:07.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:46:07.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:46:07.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:46:07.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-10 06:46:07.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-10 06:46:07.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-10 06:46:07.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-10 06:46:07.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 358173085348960334904694056689862015889592080554
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Wed Nov 10 02:38:22 UTC 2021
           Final Date: Mon Nov 10 02:38:21 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e1:0d:a8:19:ab:a4:5d:fd:a0:34:57:fd:55:31:e6:d0:27:ad:28:be]
            modulus: a75cd8bedd009dab51dfb568bb1a7cc0f1dd52c561d29da4efdaba958dc75c0bc219fefa9c859372eefe093d1d5c2993700df6092f4d88d94b8703125a45bd0627795c742160d72a3f6c63b3f866be9a0eca95a93cd528d2ae774c349663fd17fb9fd17d93b21fa4b35b65c5a16911b511ad975bb9cea109ec74ed6e4f1216a3378f9875a95979cf178baeca471db5cc37148bed124308718877afde517a6819a9241be92a167259e9bcd13d33f73bc8d2a54a1ffa99655f9168c1d2c1d33d0db9ff41b384f525f0b73e97aa9786a5e2a8addbc2828e610e828421ec307f6f085c2c5644289535e6a87d69ee4ad65b175ce24e68887adb1871dae9f2b1617187aab2ad417b521f7036c621c90a8b88e9075b1e1c227a924465ecbd0b70e9ef6f618d46c1ad5aeb36d0cc991339a0df4b3fc85bb9a6f58dd5ef98516f771d0821119c662557362bbdfe3f8f8ed7acc4bf7e27d4fa0c8d75309c261c27ae1d53a25ec1169f5b8742c83a55e2546cd53603556eff99245aea0e036e18640ebebbdb
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 434fa3034e0035252bf1561b8e74e5e5da2e6164
                       f30ac83ae4ebfe6e231d6ce60dd5bcd4d4c63543
                       8f890507e8c2c38116a1f569c8b1a465d7747ef2
                       52ca65169f8cec4d88e8c174d04ef2602d72ee70
                       e94499be41fc325e57eba1e9399e2c091b7e4709
                       3a1c6e3f81ad64470f03bc1d32269f434e97a35c
                       9cfb25c2f924b09b52350493b9a9fb9db65df957
                       749305bca3269093e0ea519d775f83a92a363c54
                       d4d6a6cfd52147a02766da24e98c349adb496b6a
                       63775fb677410d4181bc816271690e38971bf0e2
                       12e8a21d3861db1f0063e4f589944a5eb32f31f0
                       a5d81b62d7aff5e19d81d765c61d639405cc870f
                       3891b8fa7462ceb027b85a5d06b718e9f2786faf
                       dafe9824de18805ef2225bc8beb66c30d1b6ca0a
                       3770699d9a76c31365c209658d336f07ccd1ed82
                       a26be15eb0777adb51bcc7ee8280bbd1932f616f
                       c4d2495bea41dfb7513336dece861d9a6976a13c
                       e704b929b079498b3d8019aec33ec5c4260ba2d4
                       335d45ca8b8139b6a101e09c928b0727539ebe94
                       81258fd7
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [71:da:94:d7:f5:66:6a:8b:84:ff:65:5b:ec:34:f5:79:ff:eb:9b:12]
            modulus: 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
    public exponent: 10001

]