Results

By type

          2021-10-08 02:41:02,904 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-08 02:41:07,213 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-08 02:41:10.207  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-08 02:41:23.833 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-08 02:41:24.902  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-08 02:41:25.618  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-08 02:41:37.922  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 37.405 seconds (JVM running for 44.732)
2021-10-08 02:47:31.501  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 02:47:31.516 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 02:47:31.637 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 02:47:31.700 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 02:47:31.715  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-08 02:47:31.720  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 02:47:31.721  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 02:47:31.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 02:47:31.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 02:47:31.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 02:47:31.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 02:47:31.815 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 02:47:32.102 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 02:47:32.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 02:47:32.109 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 02:47:32.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 02:47:33.421  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 02:47:33.425  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 02:47:33.426 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 02:47:33.428 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 02:47:33.500  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 02:47:33.501  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 02:47:33.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 02:47:33.503 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 02:47:33.504 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 02:47:33.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 02:47:33.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 02:47:33.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 02:47:33.605 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 02:47:33.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 02:47:33.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 02:47:33.609 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 02:47:33.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:a1:96:30:b5:fe:0e:d1:40:a8:09:d9:76:6d:cd:6a:56:f3:e5:bc]
            modulus: be6e83ac6cfdb453b503d911758203ad13bc39e57ea6d3ed67728cf9490b920b9412cd62f952522000a0c967791d699c3a2bd6ce73cefacec6065bbd363f9fccadb45a31eef6f72bec1f0bbbcc41be5ee9caa17cca1f14772841723867030e9615b84d22fc4d1a826c7ef8203f652427b0b5c488bc9632e29f682abe80d5e823b190da883a878fa7d67a55ea98729e0d51e51b7a2f6a70e7fdf8b6734d996323569c327cb9c115e882c9ba1b69ea9b6fd9a081d4a8e9d2a88cad33406a6871024cb7d2918f383c3fc722abaa8ee12ced01ece57ab4ccbbd4d261a500f52669b01fad47a9213584dce33d77c89089067fc16f08c5411eedbea6442028d51d5a27
    public exponent: 10001

] 
2021-10-08 06:45:16.210  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:45:16.214 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:45:16.217 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 06:45:16.218 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:45:16.218  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-08 06:45:16.220  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:45:16.222  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:45:16.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:45:16.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:45:16.225 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:45:16.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:45:16.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:45:16.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:45:16.311 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:45:16.598  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:45:16.599  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:45:16.600 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:45:16.600 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:45:16.602  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:45:16.603  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:45:16.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:45:16.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:45:16.604 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:45:16.605 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:45:16.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:45:16.606 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:45:16.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:45:16.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:45:16.607 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:45:16.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:45:16.701 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:47:7b:9e:36:a1:07:ba:87:aa:99:9d:ba:25:fa:7d:f9:8c:94:30]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:47:11.900  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:47:11.901 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:47:11.903 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:47:11.904 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:47:11.905  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:47:11.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:47:11.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:47:11.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:47:11.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:47:11.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:47:11.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:47:11.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:47:11.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:47:11.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:47:12.112  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:47:12.113  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:47:12.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:47:12.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:47:12.116  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:47:12.117  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:47:12.117 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:47:12.118 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:47:12.118 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:47:12.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:47:12.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:47:12.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:47:12.121 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:47:12.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:47:12.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:47:12.123 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:47:12.128 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a0:14:c7:80:65:20:74:2d:4e:19:eb:65:b5:fd:ff:26:a2:b2:99:28]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:49:42.289  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:49:42.291 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:49:42.293 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 06:49:42.294 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:49:42.299  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 06:49:42.300  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:49:42.300  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:49:42.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:49:42.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:49:42.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:49:42.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:49:42.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:49:42.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:49:42.312 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:49:42.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:49:42.500  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:49:42.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:49:42.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:49:42.504  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:49:42.505  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:49:42.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:49:42.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:49:42.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:49:42.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:49:42.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:49:42.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:49:42.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:49:42.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:49:42.509 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:49:42.510 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:49:42.514 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:82:69:62:2e:cf:97:9d:69:3f:00:43:c9:22:33:27:97:1f:b6:5a]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:50:19.963  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:50:19.964 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:50:19.965 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:50:19.966 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:50:19.966  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:50:19.967  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:50:19.967  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:50:19.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:50:19.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:50:19.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:50:20.001 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:50:20.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:50:20.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:50:20.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:50:20.116  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:50:20.116  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:50:20.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:50:20.117 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:50:20.119  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:50:20.120  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:50:20.120 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:20.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:20.121 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:20.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:20.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:20.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:20.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:20.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:20.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:20.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:50:20.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [da:95:f8:55:61:a6:d4:43:6e:60:4e:49:c5:38:57:98:e7:ef:46:aa]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:50:54.447  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:50:54.448 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:50:54.450 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-08 06:50:54.451 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:50:54.451  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-08 06:50:54.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:50:54.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:50:54.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:50:54.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:50:54.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:50:54.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:50:54.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:50:54.499 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:50:54.499 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:50:54.621  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:50:54.621  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:50:54.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:50:54.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:50:54.623  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:50:54.624  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:50:54.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:54.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:54.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:54.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:54.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:54.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:54.627 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:50:54.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:50:54.628 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:50:54.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:50:54.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [02:15:9a:fd:d5:df:3e:7f:47:61:69:13:50:d5:05:c1:51:ee:3b:2a]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:51:33.793  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:51:33.795 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:51:33.796 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-08 06:51:33.797 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:51:33.797  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-08 06:51:33.798  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:51:33.798  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:51:33.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:51:33.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:51:33.800 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:51:33.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:51:33.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:51:33.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:51:33.805 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:51:33.915  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:51:33.917  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:51:33.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:51:33.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:51:33.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:51:33.919  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:51:33.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:51:33.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:51:33.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:51:33.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:51:33.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:51:33.921 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:51:33.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:51:33.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:51:33.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:51:33.923 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:51:33.926 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: ca74b918e3603aa42f00d2aaae0f0ef6f4f8611e924cad1d8350c93730ce165fddf1e291fbbc69c25022ecb25804050e3864ea2c3a9998ab6e35bcb5f6ff0a5bdf86bdacb2aac1a36d3712848f47d34c0666fdb3a455dc7be27129e81405159fdb74e3338c72deff3634fdea8885fe922c78b4e0bb20e1dcbc77f262491d4a272e3e21cdf8da64e119112a950188d200929ad12eb202a8602aa426776674230dac9b8891b89f7a1022a270a7f329a84405652bf277beceb90e1751853a1148d3c9632e7de4b8962a7224a9ee9f6e9aa33f134d1e6909476855cf9666501d4f98fa1c7b266bed11dc8c9c3ce262b4d22ecbc3e4565ace68eb3e6649f7f57311b44e9f8edc4a58811a958eee8dabe924c3eb20ecc92348ab8889614e7a7058c3bf07d69c1865ae046bcbe5ac85d158028c89b05db59a82126cbc6b7152645f95bf331871bb967ebbb68853e4807d2e7a71ff6d72155d1d6454c536f8084243b3a6dfa505e1400bcf5b75b1028684c3162d092a52ce89ec7cbc9cf06fce92316e7d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [66:c1:a0:72:c8:cf:19:79:2d:70:15:c1:81:cf:f5:53:02:e5:50:72]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:53:33.397  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:53:33.398 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:53:33.401 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:53:33.401 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:53:33.402  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:53:33.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:53:33.403  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:53:33.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:53:33.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:53:33.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:53:33.410 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:53:33.411 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:53:33.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:53:33.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:53:33.596  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:53:33.596  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:53:33.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:53:33.597 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:53:33.598  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:53:33.598  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:53:33.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:53:33.598 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:53:33.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:53:33.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:53:33.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:53:33.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:53:33.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:53:33.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:53:33.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:53:33.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:53:33.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:46:6e:15:f0:97:be:5f:fd:a3:f8:a5:aa:35:eb:21:6d:1a:cc:66]
            modulus: b554c3e80b145d5bb1d80afd0856660b6441030d4a2b7871c2ca4f25adc105f1d3c6fe540b6e59f75b85a80f62b90c05568feca4235bdfe2c1f95ef2adc9d6e1f49fe0d4df26e4449f4a4ab0894c5a3957daead50267473eb8e82047d7cb6a2eaf758d34d16fcbf526aa912ec268b6310dac83742f03717ea24156156e41b97728340ebff34f40a0e6b76c4fd32d4649b085e1d7f25460bf622db0b7549934ab45592f7207931ef15ee0b50ed9d1554dead112913ac8b524c010978c39f38ba13cfc30d68b6e6763bbe37c07bd8deef90b6cfacfe77b63f8270289dc3f3c3211d67353768b19d4d2e2ea8c5d90f66d50c8e3612e4bf816252d52da39f9341c3b
    public exponent: 10001

] 
2021-10-08 06:54:02.556  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:54:02.557 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:54:02.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:54:02.558 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:54:02.559  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:54:02.559  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:54:02.560  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:54:02.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:54:02.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:54:02.561 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:54:02.566 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:54:02.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:54:02.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:54:02.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:54:02.698  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:54:02.699  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:54:02.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:54:02.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:54:02.701  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:54:02.702  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:54:02.702 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:54:02.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:54:02.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:54:02.704 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:54:02.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:54:02.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:54:02.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:54:02.706 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:54:02.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:54:02.708 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:54:02.711 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:71:1b:6a:fe:40:73:11:e5:5f:12:13:de:f1:4e:f1:3d:65:f0:29]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:55:32.630  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:55:32.632 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:55:32.633 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:55:32.634 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:55:32.634  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 06:55:32.635  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:55:32.635  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:55:32.635 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:55:32.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:55:32.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:55:32.641 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:55:32.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:55:32.642 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:55:32.643 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:55:32.801  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:55:32.802  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:55:32.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:55:32.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:55:32.804  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:55:32.804  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:55:32.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:55:32.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:55:32.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:55:32.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:55:32.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:55:32.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:55:32.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:55:32.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:55:32.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:55:32.809 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:55:32.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a5:46:e9:24:4e:3a:b1:ea:4c:1d:4b:01:b5:ee:93:92:df:3b:48:cc]
            modulus: cb7aa5a6a6d67936ed553335577d5ef01c03239025c4ba23d60ad378f8fa128156cfbde69dd988408bb808f4baa69655460afd889cab22c1a56070ee4fa778aeb28e243c1bfc822d26e07bb1bc62a7c8c4c19fad565c05b870c8a37ddeeb22915c695cea02d20e86e28849a541d0d4f47e76f55d894e569a4ec342273dc74ceb3057844c9355af71ac740f973384863072052036b5d913af73756a1deb30a2e12a5c1f2a9f0f1eb0332d9ca2dc99d327faab180ac0e9c9003a98a4472ef0802353b81b5c4f81f8623784ed6caf1dab0af01ee7b8546467f5b577f6c5adadf024e1001606f8354c488e2b8753c1f21c79ca05893e2123384f2d1153cbce381a07
    public exponent: 10001

] 
2021-10-08 06:56:13.372  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:56:13.373 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:56:13.374 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:56:13.374 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:56:13.374  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 06:56:13.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:56:13.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:56:13.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:56:13.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:56:13.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:56:13.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:56:13.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:56:13.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:56:13.380 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:56:13.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:56:13.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:56:13.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:56:13.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:56:13.490  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:56:13.491  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:56:13.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:56:13.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:56:13.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:56:13.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:56:13.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:56:13.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:56:13.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:56:13.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:56:13.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:56:13.498 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:56:13.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d0:5f:56:5a:c2:48:17:22:e6:5c:52:a3:c1:b4:4a:73:29:95:64:55]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 06:57:25.914  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 06:57:25.915 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 06:57:25.917 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 06:57:25.918 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 06:57:25.918  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 06:57:25.918  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 06:57:25.919  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 06:57:25.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 06:57:25.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 06:57:25.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 06:57:25.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 06:57:25.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:57:25.924 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 06:57:25.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:57:26.046  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 06:57:26.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 06:57:26.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 06:57:26.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 06:57:26.049  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 06:57:26.050  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 06:57:26.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:57:26.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:57:26.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:57:26.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:57:26.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:57:26.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:57:26.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 06:57:26.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 06:57:26.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 06:57:26.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 06:57:26.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [98:56:57:aa:9a:cf:c0:50:92:4d:3e:b0:eb:30:09:aa:3a:02:50:d3]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 07:01:25.988  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 07:01:25.990 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 07:01:25.992 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 07:01:25.993 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 07:01:25.993  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-08 07:01:25.994  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 07:01:25.994  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 07:01:25.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 07:01:25.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 07:01:25.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 07:01:26.005 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 07:01:26.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:01:26.006 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:01:26.007 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:01:26.345  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 07:01:26.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 07:01:26.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 07:01:26.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:01:26.348  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 07:01:26.349  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 07:01:26.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:01:26.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:01:26.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:01:26.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:01:26.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:01:26.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:01:26.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:01:26.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:01:26.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:01:26.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 07:01:26.356 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [14:61:68:7a:98:64:3e:66:a1:b1:5e:1e:d1:cc:fc:94:95:5c:35:40]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 07:02:57.570  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 07:02:57.571 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 07:02:57.573 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 07:02:57.574 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 07:02:57.574  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-08 07:02:57.575  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 07:02:57.575  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 07:02:57.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 07:02:57.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 07:02:57.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 07:02:57.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 07:02:57.581 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:02:57.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:02:57.582 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:02:57.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 07:02:57.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 07:02:57.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 07:02:57.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:02:57.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 07:02:57.701  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 07:02:57.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:02:57.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:02:57.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:02:57.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:02:57.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:02:57.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:02:57.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:02:57.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:02:57.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:02:57.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 07:02:57.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [52:b6:55:30:c3:20:8e:f0:ed:8a:62:90:bf:48:3f:ea:2f:0b:5f:9c]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 07:04:51.674  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 07:04:51.676 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 07:04:51.677 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 07:04:51.678 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 07:04:51.678  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 07:04:51.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 07:04:51.679  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 07:04:51.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 07:04:51.679 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 07:04:51.680 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 07:04:51.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 07:04:51.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:04:51.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:04:51.685 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:04:51.820  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 07:04:51.820  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 07:04:51.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 07:04:51.821 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:04:51.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 07:04:51.822  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 07:04:51.822 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:51.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:51.823 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:51.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:51.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:51.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:51.824 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:51.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:51.825 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:51.826 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 07:04:51.829 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:0f:d6:fb:b4:00:53:64:66:f1:a8:e7:47:1b:5a:c0:14:61:f2:36]
            modulus: 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
    public exponent: 10001

] 
2021-10-08 07:04:53.067  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-08 07:04:53.068 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-08 07:04:53.069 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 07:04:53.070 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-08 07:04:53.070  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-08 07:04:53.071  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-08 07:04:53.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-08 07:04:53.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-08 07:04:53.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-08 07:04:53.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-08 07:04:53.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-08 07:04:53.079 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:04:53.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-08 07:04:53.080 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:04:53.163  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-08 07:04:53.164  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-08 07:04:53.164 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-08 07:04:53.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-08 07:04:53.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-08 07:04:53.166  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-08 07:04:53.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:53.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:53.167 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:53.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:53.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:53.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:53.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-08 07:04:53.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-08 07:04:53.169 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-08 07:04:53.170 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-08 07:04:53.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 300218151933197195232474570755481514736597951965
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Fri Oct 08 02:26:05 UTC 2021
           Final Date: Wed Oct 08 02:26:04 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [00:23:87:88:b9:cc:89:96:69:92:1c:67:1a:da:11:a2:f4:0e:e8:ce]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a6e7594f3812df6f3c3b9314c8836515576748dd
                       418e41d8f0b05d9fe2364a67191a0ce0f9cb18c5
                       55b13c78d7e25b7a82e7d93b178c492659832ce1
                       aeccad8de692230e8b3ebb4e245df3392956d2ca
                       f3f462e2db643be017a2f780d00686f805c432c6
                       619ec7a4dd040a4db84d9586168158a393bc6cfd
                       c1e3bf0840b342b25eff1f666b9ff037c54a0f19
                       aa9a7f1496788dc1e1dd15048f7de95734a3c205
                       fd0463dc78046440fb95379c19c4376a288b3eb8
                       11d81658fc48c0a67d94f6ab4e4aeae3ee35338b
                       02e334e8881df27774f3aeac79a92f0dad4edb25
                       c3e33c2afaf70b538865649a6a8d4ea39af2d189
                       da7eeee792258f2163e96498c5b131480e845aeb
                       76a8dc1d5b318258a0e5c0f5a63e5d7b4a98032e
                       91944f84e7f0ba093df87e9adf2cde3b0ad52d71
                       6fb452bf10ef95e578fefe37ee94da4a758ac21a
                       0805b5aaccfe7e8fc020eaf7c817a36de4bd6ede
                       e8950e6919627be8106c19a5ffb731e7696bea4d
                       8ac40ac72e134e234a110ea7c4aabbb8aa216c41
                       a960d9cf
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:0f:d6:fb:b4:00:53:64:66:f1:a8:e7:47:1b:5a:c0:14:61:f2:36]
            modulus: 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
    public exponent: 10001

]