Results

By type

          2021-07-23 01:13:51,338 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-07-23 01:13:54,543 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-07-23 01:13:57.138  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-07-23 01:14:06.841 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-07-23 01:14:07.659  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-07-23 01:14:08.437  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-07-23 01:14:19.248  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 29.9 seconds (JVM running for 35.978)
2021-07-23 01:15:00.443  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 01:15:00.452 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 01:15:00.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-23 01:15:00.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 01:15:00.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-07-23 01:15:00.643  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 01:15:00.647  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 01:15:00.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 01:15:00.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 01:15:00.746  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 01:15:00.749  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 01:15:00.936  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 01:15:00.940  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 01:15:00.941  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 01:15:00.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 01:15:01.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 01:15:01.972  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 01:15:01.972 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 01:15:02.037 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 01:15:02.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 01:15:02.039  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 01:15:02.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 01:15:02.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 01:15:02.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 01:15:02.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 01:15:02.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 01:15:02.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 01:15:02.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 01:15:02.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 01:15:02.143 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 01:15:02.144 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 01:15:02.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 01:15:02.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [de:db:48:d4:22:18:57:60:57:68:cf:07:26:f7:cc:8b:55:b6:e0:64]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:08:44.673  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:08:44.674 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:08:44.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-23 04:08:44.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:08:44.678  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [dcae-datafile-collector, datafile-collector, datafile] }
2021-07-23 04:08:44.679  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:08:44.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:08:44.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:08:44.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:08:44.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:08:44.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:08:44.745  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:08:44.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:08:44.834  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:08:44.835  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:08:44.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:08:44.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:08:44.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:08:44.838  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:08:44.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:08:44.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:08:44.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:08:44.841  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:08:44.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:08:44.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:08:44.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:08:44.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:08:44.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:08:44.843 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:08:44.844 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:08:44.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:5f:2f:86:c0:85:87:00:55:b3:a1:fa:55:df:2f:3b:01:46:5a:f2]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:10:34.559  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:10:34.560 DEBUG 1 [nio-8443-exec-9] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:10:34.561 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:10:34.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:10:34.562  INFO 1 [nio-8443-exec-9] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:10:34.563  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:10:34.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:10:34.564  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:10:34.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:10:34.642  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:10:34.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:10:34.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:10:34.646  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:10:34.781  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:10:34.782  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:10:34.834 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:10:34.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:10:34.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:10:34.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:10:34.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:10:34.843  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:10:34.843  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:10:34.843  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:10:34.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:10:34.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:10:34.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:10:34.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:10:34.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:10:34.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:10:34.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:10:34.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [54:bf:69:b9:a6:05:69:43:13:1d:0d:7d:00:61:38:af:2c:3c:b4:d5]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:14:02.713  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:14:02.714 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:14:02.715 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:14:02.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:14:02.716  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:14:02.717  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:14:02.717  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:14:02.717  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:14:02.718  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:14:02.722  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:14:02.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:14:02.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:14:02.725  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:14:02.834  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:14:02.835  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:14:02.835 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:14:02.837 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:14:02.838  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:14:02.839  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:14:02.841  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:14:02.842  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:14:02.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:14:02.843  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:14:02.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:14:02.844 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:14:02.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:14:02.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:14:02.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:14:02.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:14:02.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:14:03.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [07:8d:6a:6b:53:1f:ca:ce:42:95:e4:33:64:39:2a:2a:78:70:14:17]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:14:34.608  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:14:34.610 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:14:34.611 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-07-23 04:14:34.612 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:14:34.613  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-07-23 04:14:34.613  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:14:34.614  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:14:34.614  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:14:34.615  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:14:34.619  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:14:34.619  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:14:34.620  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:14:34.635  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:14:34.688  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:14:34.734  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:14:34.734 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:14:34.736 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:14:34.736  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:14:34.738  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:14:34.740  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:14:34.740  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:14:34.740  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:14:34.741  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:14:34.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:14:34.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:14:34.742 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:14:34.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:14:34.743 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:14:34.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:14:34.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:14:34.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [18:6d:48:c9:f1:d1:e7:07:4c:57:90:ba:d1:66:eb:5f:96:8f:44:52]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:15:09.233  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:15:09.234 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:15:09.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:15:09.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:15:09.236  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:15:09.236  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:15:09.237  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:15:09.237  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:15:09.237  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:15:09.242  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:15:09.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:15:09.243  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:15:09.244  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:15:09.400  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:15:09.401  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:15:09.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:15:09.434 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:15:09.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:15:09.435  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:15:09.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:15:09.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:15:09.437  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:15:09.437  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:15:09.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:15:09.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:15:09.438 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:15:09.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:15:09.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:15:09.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:15:09.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:15:09.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [64:c0:20:ee:6f:2c:1f:5b:9e:4e:c6:08:bb:f4:53:2a:46:d1:de:10]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:15:09.548  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:15:09.549 DEBUG 1 [nio-8443-exec-5] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:15:09.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-07-23 04:15:09.550 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:15:09.550  INFO 1 [nio-8443-exec-5] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-07-23 04:15:09.551  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:15:09.551  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:15:09.552  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:15:09.552  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:15:09.634  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:15:09.635  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:15:09.635  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:15:09.636  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:15:09.675  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:15:09.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:15:09.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:15:09.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:15:09.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:15:09.678  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:15:09.735  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:15:09.735  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:15:09.736  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:15:09.736  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:15:09.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:15:09.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:15:09.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:15:09.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:15:09.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:15:09.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:15:09.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:15:09.741 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ae:79:00:9a:8a:e2:69:ca:3e:b7:e4:96:ef:31:89:24:e3:87:da:f0]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:17:39.826  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:17:39.827 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:17:39.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:17:39.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:17:39.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:17:39.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:17:39.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:17:39.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:17:39.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:17:39.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:17:39.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:17:39.834  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:17:39.835  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:17:39.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:17:39.896  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:17:39.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:17:39.897 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:17:39.898  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:17:39.934  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:17:39.935  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:17:39.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:17:39.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:17:39.936  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:17:39.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:17:39.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:17:39.937 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:17:39.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:17:39.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:17:39.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:17:39.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:17:39.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4e:1c:dc:31:d1:af:4e:da:d2:17:32:ea:d4:81:a3:65:1e:fc:12:8c]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:17:53.054  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:17:53.054 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:17:53.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:17:53.056 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:17:53.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:17:53.056  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:17:53.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:17:53.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:17:53.057  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:17:53.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:17:53.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:17:53.061  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:17:53.062  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:17:53.115  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:17:53.115  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:17:53.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:17:53.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:17:53.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:17:53.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:17:53.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:17:53.134  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:17:53.134  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:17:53.135  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:17:53.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:17:53.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:17:53.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:17:53.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:17:53.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:17:53.136 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:17:53.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:17:53.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:96:f1:b6:85:32:29:10:1a:8e:06:e7:a3:91:cf:7e:e7:de:25:f3]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:20:49.286  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:20:49.287 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:20:49.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:20:49.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:20:49.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:20:49.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:20:49.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:20:49.289  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:20:49.290  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:20:49.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:20:49.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:20:49.294  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:20:49.295  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:20:49.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:20:49.355  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:20:49.355 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:20:49.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:20:49.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:20:49.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:20:49.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:20:49.359  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:20:49.359  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:20:49.365  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:20:49.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:20:49.368 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:20:49.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:20:49.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:20:49.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:20:49.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:20:49.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:20:49.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:d8:8e:57:59:3a:bd:c1:e8:c6:e1:06:14:03:44:79:77:95:c9:f4]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:22:01.402  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:22:01.403 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:22:01.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:22:01.404 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:22:01.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:22:01.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:22:01.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:22:01.406  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:22:01.406  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:22:01.410  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:22:01.411  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:22:01.411  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:22:01.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:22:01.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:22:01.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:22:01.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:22:01.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:22:01.468  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:22:01.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:22:01.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:22:01.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:22:01.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:22:01.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:22:01.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:22:01.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:22:01.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:22:01.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:22:01.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:22:01.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:22:01.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:22:01.476 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [83:27:b0:3f:23:50:82:3c:ab:76:98:1b:72:67:f0:db:b0:e7:de:e4]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:22:40.076  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:22:40.077 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:22:40.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:22:40.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:22:40.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:22:40.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:22:40.079  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:22:40.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:22:40.080  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:22:40.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:22:40.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:22:40.084  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:22:40.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:22:40.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:22:40.142  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:22:40.143 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:22:40.144 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:22:40.144  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:22:40.145  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:22:40.145  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:22:40.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:22:40.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:22:40.146  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:22:40.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:22:40.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:22:40.147 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:22:40.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:22:40.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:22:40.148 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:22:40.149 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:22:40.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [11:e2:f1:9a:ad:93:3d:9a:e5:07:96:27:30:aa:91:00:c3:58:67:71]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:23:40.694  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:23:40.695 DEBUG 1 [nio-8443-exec-4] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:23:40.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:23:40.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:23:40.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:23:40.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:23:40.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:23:40.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:23:40.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:23:40.704  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:23:40.704  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:23:40.704  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:23:40.705  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:23:40.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:23:40.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:23:40.767 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:23:40.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:23:40.769  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:23:40.769  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:23:40.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:23:40.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:23:40.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:23:40.770  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:23:40.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:23:40.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:23:40.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:23:40.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:23:40.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:23:40.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:23:40.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:23:40.775 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: daa7340c1cfeacdd076508d92c407eb6a40c41a6bcfdb677716ee9c09c5830bf61130ea0dfea4f7fbc3a8fd16fc83dc9fc0badca5d582924ea2aad0fdb1d38e9385cf3c5fcf998581fc7bd435d4af709c25b43de23670421f8c7d2b71a7177bf66e307713c5e20c48251adfc730896b2809e75f09b35e31969729a33248696dfb59830204218975cb4a7ce845e9ac038faf579690166ee38f087f61cac7795225c2ff93773168c18bf4e964deec229f48c867af8164ef8961824a2f395331d1ce3eba89e2bbc5d35673032114a7405219ccc892c38bd4a8fb2668c1f63513f2205a52204255da7e311f89aaf9b49c95def2018c607acef85e194bc28182e063a0fc66dd25ced5ca3ad369eaa81f321c5c27f70dd96020cbaf6b8b3daabe91589c31aadf9cc78193fc2e87cf5a2e7151569b6ae63e7d41b585f71ec221a5c686c08815ebeac441e68620cecc1578bd48d44cadad2bd9540159fe308f33b499b5ec28990327a1da1a73bf1c45b50b8145303de7883a65d7531083c597275462b4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e9:3b:45:fe:99:99:b8:bc:4b:02:f6:cd:c4:e2:b1:7c:14:97:78:a5]
            modulus: c288ff038288fd04513e3569b895bda8c17b8caf81d81902c41c31a9644019d64d4c82a9ac40963b3a08f7056717fa7f583f89409b45496d474d53e30c5d84c01dd37bb86fc1a9cf061120fba32fa3ec6c39f85dc0fb5495cbf9f349cda8bd8c3fe94df8ea303588db781e0e08a8cb30e21f9c9da60e857ceaa463054de57afb99e344deebce18ea5ffe1fcde5105b8c8dca9b6a0a93f6b938375481e1578f231041d4a61425f3559e4152da1d96480cfd2439e4a34c4bbda98bea17f92a4b27db20d77ef372be7f5e494c75ba86bdca3ee322f4095c298d4273d1a7d2be41e8680ebd4f35908d013c65e14826e7cfb239cb4347bfae8b269a6d8d947f386621
    public exponent: 10001

] 
2021-07-23 04:25:32.077  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:25:32.078 DEBUG 1 [nio-8443-exec-2] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:25:32.079 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:25:32.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:25:32.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:25:32.080  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:25:32.081  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:25:32.081  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:25:32.081  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:25:32.085  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:25:32.085  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:25:32.085  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:25:32.086  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:25:32.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:25:32.144  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:25:32.145 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:25:32.146 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:25:32.146  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:25:32.147  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:25:32.148  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:25:32.148  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:25:32.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:25:32.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:25:32.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:25:32.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:25:32.150 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:25:32.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:25:32.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:25:32.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:25:32.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:25:32.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [09:be:d6:82:04:a3:3b:ab:4a:6c:9b:08:81:45:d0:88:74:df:d4:88]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:26:43.122  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:26:43.123 DEBUG 1 [nio-8443-exec-7] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:26:43.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:26:43.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:26:43.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:26:43.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:26:43.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:26:43.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:26:43.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:26:43.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:26:43.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:26:43.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:26:43.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:26:43.207  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:26:43.208  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:26:43.208 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:26:43.209 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:26:43.209  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:26:43.209  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:26:43.210  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:26:43.210  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:26:43.211  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:26:43.211  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:26:43.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:26:43.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:26:43.211 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:26:43.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:26:43.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:26:43.212 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:26:43.213 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:26:43.215 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: daa7340c1cfeacdd076508d92c407eb6a40c41a6bcfdb677716ee9c09c5830bf61130ea0dfea4f7fbc3a8fd16fc83dc9fc0badca5d582924ea2aad0fdb1d38e9385cf3c5fcf998581fc7bd435d4af709c25b43de23670421f8c7d2b71a7177bf66e307713c5e20c48251adfc730896b2809e75f09b35e31969729a33248696dfb59830204218975cb4a7ce845e9ac038faf579690166ee38f087f61cac7795225c2ff93773168c18bf4e964deec229f48c867af8164ef8961824a2f395331d1ce3eba89e2bbc5d35673032114a7405219ccc892c38bd4a8fb2668c1f63513f2205a52204255da7e311f89aaf9b49c95def2018c607acef85e194bc28182e063a0fc66dd25ced5ca3ad369eaa81f321c5c27f70dd96020cbaf6b8b3daabe91589c31aadf9cc78193fc2e87cf5a2e7151569b6ae63e7d41b585f71ec221a5c686c08815ebeac441e68620cecc1578bd48d44cadad2bd9540159fe308f33b499b5ec28990327a1da1a73bf1c45b50b8145303de7883a65d7531083c597275462b4f
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c5:95:10:37:d8:db:bb:d0:69:52:91:1a:a0:fb:6e:13:f8:c3:15:bc]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:28:14.585  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:28:14.586 DEBUG 1 [nio-8443-exec-1] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:28:14.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:28:14.587 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:28:14.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:28:14.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:28:14.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:28:14.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:28:14.588  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:28:14.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:28:14.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:28:14.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:28:14.593  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:28:14.700  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:28:14.700  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:28:14.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:28:14.701 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:28:14.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:28:14.702  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:28:14.702  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:28:14.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:28:14.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:28:14.703  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:28:14.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:28:14.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:28:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:28:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:28:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:28:14.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:28:14.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:28:14.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9c:2a:36:ed:a6:4a:8b:85:c2:a6:b8:44:3a:c1:99:66:88:b4:aa:0f]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:32:08.640  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:32:08.641 DEBUG 1 [io-8443-exec-10] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:32:08.642 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:32:08.642 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:32:08.643  INFO 1 [io-8443-exec-10] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-07-23 04:32:08.643  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:32:08.643  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:32:08.644  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:32:08.644  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:32:08.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:32:08.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:32:08.649  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:32:08.650  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:32:08.720  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:32:08.720  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:32:08.720 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:32:08.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:32:08.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:32:08.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:32:08.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:32:08.723  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:32:08.724  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:32:08.724  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:32:08.724 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:32:08.724 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:32:08.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:32:08.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:32:08.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:32:08.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:32:08.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:32:08.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b6:62:16:3b:b6:6e:ca:e9:67:78:63:f9:f8:01:4d:a2:af:e2:17:c0]
            modulus: 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
    public exponent: 10001

] 
2021-07-23 04:33:22.050  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:33:22.051 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:33:22.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:33:22.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:33:22.052  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-collector-cmpv2-cert, ves-cmpv2-cert] }
2021-07-23 04:33:22.053  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:33:22.053  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:33:22.053  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:33:22.053  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:33:22.057  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:33:22.057  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:33:22.058  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:33:22.059  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:33:22.122  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:33:22.123  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:33:22.123 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:33:22.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:33:22.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:33:22.125  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:33:22.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:33:22.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:33:22.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:33:22.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:33:22.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:33:22.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:33:22.135 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:33:22.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:33:22.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:33:22.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:33:22.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:33:22.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [1b:11:d2:09:84:c2:4e:f6:b0:81:02:0d:48:ca:b7:c9:5e:06:3f:e4]
            modulus: b94157770ab40ffcadf9d06b5803223d0bd794f57f255c36255cdc598a631f3b5fad3be2307fb82a85d4727afc4a995cc9a38da186aaf95ac08fe1e9b8798c82f41629671c5c61103e0ad594d2877d2120a04b251c7f75f3a5c1ab6a85ebff1a1e59d17b2c61eb9a80bed4deb72c3e182bfaf523494a635b1f2dc3020c4ea31861f9ea02a8fb66907c414a713e248ce470ee34212272af94756d5d33d4e046033a6936c3dc1107556ea3b4787ebf320de65b5a4f498ab4295f9905c6f2104be7fb0149faf5ca50fcd5965b4a9758fb3d16ea5be4ef0d798eb6edb03233532d144d0a7b3a31b0ac7b7a156de435584b63c37a4f6a293730129fb25559a931d8fd
    public exponent: 10001

] 
2021-07-23 04:34:54.406  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate signing request for CA named: RA
2021-07-23 04:34:54.407 DEBUG 1 [nio-8443-exec-8] .o.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-07-23 04:34:54.407 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:34:54.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caMode=RA, caName='RA', issuerDN='CN=ManagementCA', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-07-23 04:34:54.408  INFO 1 [nio-8443-exec-8] o.o.o.c.c.CertificationModelFactory      : Sending sign request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-07-23 04:34:54.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Validate before creating Certificate Request for CA :RA in Mode RA 
2021-07-23 04:34:54.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-07-23 04:34:54.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-07-23 04:34:54.409  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-07-23 04:34:54.415  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-07-23 04:34:54.416  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:34:54.417  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-07-23 04:34:54.418  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-07-23 04:34:54.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-07-23 04:34:54.505  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type: 1 
2021-07-23 04:34:54.506 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying signature of the response.
2021-07-23 04:34:54.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying PasswordBased Protection of the Response.
2021-07-23 04:34:54.535  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Iteration count is: 1203
2021-07-23 04:34:54.535  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : One Way Function type is: 1.3.14.3.2.26
2021-07-23 04:34:54.536  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Mac type is: 1.3.6.1.5.5.8.1.2
2021-07-23 04:34:54.536  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseValidationHelper  : Implicit Confirm on certificate from server.
2021-07-23 04:34:54.537  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Response status code: 0
2021-07-23 04:34:54.537  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-07-23 04:34:54.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:34:54.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:34:54.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:34:54.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-07-23 04:34:54.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-07-23 04:34:54.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-07-23 04:34:54.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
2021-07-23 04:34:54.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 694817588580250596715869913683791883862234760879
             IssuerDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Jul 23 01:08:50 UTC 2021
           Final Date: Wed Jul 23 01:08:49 UTC 2031
            SubjectDN: UID=c-0pd2nvf4wyv86xd96,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d7:59:8b:42:4b:c0:f6:42:ac:08:e3:c3:25:24:fb:80:4d:b3:fb:ec]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8bc530851ce236ecd3a9ed771588d777e5bbb14d
                       1a332117c9b57441b0d1c3f69eb00add898446b6
                       4d928e13130d89d8878887999b5b2056ecbd424c
                       b788ed4cd7efa025c6fb0b3955bd49766f720552
                       a2622935209883629f74e889bc7e70e4ebc11876
                       ceb26136d6e99274e41875ac999857f2abb5fd35
                       156388277f91a08d603bfefdc194f8a19e501198
                       a1e5099d2af7453272c7763700e46f6adc683c41
                       bec6a777ee9cbaff71893af8de06bb298ac06f90
                       602e4877d7246acf2d31f87a30fb82f2b51cfe7c
                       90adf3ff20eed562cd60d755c61f22a37e87b1dd
                       0f51f8e1f01ca2f16bab2a3a964eac4b319d7a73
                       0006eb7dec64886b25b25321534e550d090f0436
                       1de2c0b6d49c0e288f10942991b903f8d12f8c29
                       f4608598cb5dd46418d06aacf87a0620c8f1472c
                       80d1b3c17781756bdf963b533cbfe1a48f87aff1
                       979af688beebcf5ee82a3b7363afeb4fb6c30310
                       52f83e8b684ea703654aa2f0404950b52548166f
                       20224b266de1cfe857b3ecee6a2b04a611b976a6
                       165fb47f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d9:df:d1:5d:fd:c9:08:b1:9a:0c:32:20:cf:be:be:6a:3b:86:9e:5b]
            modulus: e02d56fbbb880f29f5e74255d8330da96e5743f1344c133ce9bf8ee94cb96524d64ef154813bb0c31cafc598e3918797e8eb4b8e6bd8b702dd01d8c5153ea2631bed4f292133e01bdca8b4a1a14f49a551e68ad9ef6569a0081a80c466c39a2f1e71b0593518573cda61885d25071129e9199cc22b231f8a560dc6d855ac78f6d47afbb1f024439e50213fc0556a558e9ea45027e07590b3dc4032bb7b6e164fe2324d0def8ff23a5028e4070db3a1b194837adc88c5fe56fde61d1cc9340042bb76176481f58ca694cca8ef332592b8c3d0f77b55b4792083dad67bb84e17d6d054fe681717512e1fe83490a23bc3ce460b54698201551bb00d8c1e4890de43
    public exponent: 10001

]