Results

By type

          2021-10-24 01:49:17,822 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-24 01:49:22,634 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-24 01:49:25.736  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-24 01:49:41.238 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-24 01:49:42.723  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-24 01:49:43.426  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-24 01:49:56.337  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 40.907 seconds (JVM running for 48.738)
2021-10-24 01:50:23.124  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 01:50:23.131 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 01:50:23.328 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-24 01:50:23.332 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 01:50:23.427  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-24 01:50:23.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 01:50:23.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 01:50:23.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 01:50:23.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 01:50:23.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 01:50:23.524 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 01:50:23.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 01:50:23.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 01:50:23.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 01:50:23.730 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 01:50:23.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 01:50:25.228  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 01:50:25.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 01:50:25.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 01:50:25.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 01:50:25.242  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 01:50:25.243  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 01:50:25.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 01:50:25.244 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 01:50:25.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 01:50:25.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 01:50:25.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 01:50:25.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 01:50:25.421 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 01:50:25.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 01:50:25.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 01:50:25.427 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 01:50:25.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [06:0b:e3:33:30:06:08:68:c7:f2:90:28:63:4c:79:57:e8:00:cd:bb]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:03:47.094  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:03:47.096 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:03:47.099 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-24 04:03:47.101 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:03:47.120  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-24 04:03:47.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:03:47.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:03:47.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:03:47.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:03:47.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:03:47.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:03:47.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:03:47.135 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:03:47.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:03:47.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:03:47.439  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:03:47.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:03:47.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:03:47.444  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:03:47.445  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:03:47.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:03:47.446 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:03:47.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:03:47.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:03:47.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:03:47.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:03:47.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:03:47.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:03:47.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:03:47.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:03:47.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7b:60:a7:f2:c5:9e:57:d1:89:fa:6b:9f:29:c9:d3:85:7b:6a:94:38]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:05:22.199  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:05:22.201 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:05:22.218 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:05:22.219 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:05:22.220  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:05:22.220  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:05:22.221  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:05:22.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:05:22.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:05:22.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:05:22.232 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:05:22.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:05:22.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:05:22.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:05:22.426  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:05:22.427  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:05:22.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:05:22.428 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:05:22.430  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:05:22.431  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:05:22.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:05:22.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:05:22.432 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:05:22.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:05:22.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:05:22.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:05:22.434 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:05:22.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:05:22.435 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:05:22.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:05:22.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d6:9b:f8:85:68:fd:72:9b:2f:af:73:65:f1:65:5a:14:ac:5a:7a:33]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:08:17.718  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:08:17.719 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:08:17.721 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:08:17.721 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:08:17.722  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:08:17.723  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:08:17.724  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:08:17.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:08:17.724 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:08:17.725 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:08:17.733 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:08:17.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:17.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:17.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:17.941  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:08:17.942  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:08:17.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:08:17.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:17.944  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:08:17.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:08:17.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:17.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:17.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:17.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:17.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:17.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:17.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:17.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:17.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:17.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:08:18.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [59:43:56:97:ca:aa:df:2e:ea:90:22:3f:a1:ae:f6:16:b6:f6:eb:1c]
            modulus: cf2f03c586177c1c25b7b863416c1ad90019f23c50770923c50d1962ab8e9ab31eab1f3716b2199d1bc0849faeecec353e56c2e1ca3afb4cf95b691839fa8645f1620604131529ae9d642fa5b61256fe0359c6dc021b333559ac33b764d82cc5149927fdac60731f0178a9d9dbcc006f6805db8b9427da6101d15a8237aed6ceb6691478dac06d728e613f66634c923e10b068d85950f9c2de1ed2555e5b5b61adb77e897ae23e3c5022bf5313da5d458e8f083038214b120485039992e008aeb95ce63b9402d67d966dbb800958052a7cdcff7a0214b4f44f8771cbe76ce13a4fc990b4351fa87e4f4bae94a137ca98c61bb19511465101570d27159e03b045
    public exponent: 10001

] 
2021-10-24 04:08:18.475  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:08:18.476 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:08:18.477 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-24 04:08:18.478 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:08:18.479  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-24 04:08:18.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:08:18.480  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:08:18.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:08:18.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:08:18.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:08:18.529 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:08:18.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:18.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:18.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:18.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:08:18.604  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:08:18.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:08:18.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:18.619  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:08:18.620  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:08:18.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:18.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:18.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:18.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:18.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:18.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:18.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:18.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:18.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:18.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:08:18.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b8:0f:a5:f7:c0:1d:94:a1:ea:de:b7:1a:11:da:a0:cd:6e:e0:b0:0a]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:08:50.948  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:08:50.949 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:08:50.950 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-24 04:08:50.951 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:08:50.951  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-24 04:08:50.951  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:08:50.952  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:08:50.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:08:50.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:08:50.953 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:08:50.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:08:50.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:50.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:08:50.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:52.559  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:08:52.560  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:08:52.560 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:08:52.561 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:08:52.563  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:08:52.564  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:08:52.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:52.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:52.565 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:52.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:52.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:52.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:52.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:08:52.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:08:52.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:08:52.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:08:52.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [96:bb:a3:b8:99:ee:44:33:13:78:3a:29:bc:f1:ac:7b:5d:cf:6a:f0]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:09:24.028  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:09:24.029 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:09:24.030 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-24 04:09:24.030 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:09:24.030  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-24 04:09:24.031  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:09:24.031  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:09:24.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:09:24.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:09:24.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:09:24.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:09:24.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:09:24.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:09:24.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:09:24.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:09:24.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:09:24.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:09:24.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:09:24.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:09:24.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:09:24.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:09:24.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:09:24.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:09:24.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:09:24.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:09:24.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:09:24.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:09:24.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:09:24.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:09:24.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:09:24.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: bfe4f9aa02fb63aba595f4b0e4e3a542b970109981d4b734b1d87401bbafeb8c12274c32700f0c78104860f5fad7ae634a6aaa81a3809f2a5f6fcdd4672c85085b72a3036a8c6efe51ba4c1ac998c25a854a95e479d93001070e345aa1b5a3bcdb2e64cdca90b2a4a834be49d9fb2cc51a495703f86e70926d22ded30eb977bb2cc8ea0fb01855ae45016c96bb3a7439a93c27efbd50157c9d0a6c491fe561d162e8cfb3dfb832ea259b53f1cefef176e7e248cd394bc04ec575a51a8adfc0ecec2b4a0f23a9f87848d8d5bb5b050ca011d7a2d669603866daa32dc89e105d4c58b2a6265ad1f6f5ddf9fb5022c58c743aabe74526d6fd80d1eb60f8ddf66ce26c555dcee0fc1d037938ea18a87200e51c23d15c2429417b31955334f817318cd2826d4f8246c5a7e43b09c71d16c4df2421c80bbab4aae7ab39a6f6012ded896d532a6d348f8f2ca567000c2d2a591802bd9285047c1e646a865a5eb71e95ef0668804c36f929ecb911e20baf8468bd48e8f86c83ebf7f41b542ffd973669ad
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [46:0d:9c:c8:e3:0d:8b:f6:8a:cb:d2:11:a6:a1:9d:3b:d8:ad:a0:91]
            modulus: ac2cf329b4d592139abad82648230d70e9ea62699844af5ef27b7125cfc25ca4ef2f80f620d0f7fc8b00831be40749c8b345258c55a13183d2b791429837e96215e46e48556d4e7a5f9885c739fbfd8ad98d3a6d8b56a8d060a0957590bdcecb6bce1f74f64a6f9b3f5a7526926269e16012f46dfbea3c8e927974d5e9b6f31545a9f7be112fffabcd463b440deeb8ab2070877f5ef0e421619149d2801299ff23611136a6446235d4f9c99011dfb42a91a7d32bfcf9e46517575b619ac79f108d84288e23365225005603f72301ec1dbb7ab7a43d580875f6364bad4dba3ae85b899e534a1309a519e55dc307ea983cc4a41f2c13a166ddacff0f38fc2fc0fb
    public exponent: 10001

] 
2021-10-24 04:11:29.442  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:11:29.443 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:11:29.445 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:11:29.445 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:11:29.451  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:11:29.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:11:29.452  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:11:29.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:11:29.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:11:29.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:11:29.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:11:29.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:11:29.527 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:11:29.528 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:11:29.648  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:11:29.649  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:11:29.649 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:11:29.650 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:11:29.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:11:29.651  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:11:29.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:11:29.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:11:29.653 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:11:29.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:11:29.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:11:29.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:11:29.655 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:11:29.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:11:29.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:11:29.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:11:29.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: bfe4f9aa02fb63aba595f4b0e4e3a542b970109981d4b734b1d87401bbafeb8c12274c32700f0c78104860f5fad7ae634a6aaa81a3809f2a5f6fcdd4672c85085b72a3036a8c6efe51ba4c1ac998c25a854a95e479d93001070e345aa1b5a3bcdb2e64cdca90b2a4a834be49d9fb2cc51a495703f86e70926d22ded30eb977bb2cc8ea0fb01855ae45016c96bb3a7439a93c27efbd50157c9d0a6c491fe561d162e8cfb3dfb832ea259b53f1cefef176e7e248cd394bc04ec575a51a8adfc0ecec2b4a0f23a9f87848d8d5bb5b050ca011d7a2d669603866daa32dc89e105d4c58b2a6265ad1f6f5ddf9fb5022c58c743aabe74526d6fd80d1eb60f8ddf66ce26c555dcee0fc1d037938ea18a87200e51c23d15c2429417b31955334f817318cd2826d4f8246c5a7e43b09c71d16c4df2421c80bbab4aae7ab39a6f6012ded896d532a6d348f8f2ca567000c2d2a591802bd9285047c1e646a865a5eb71e95ef0668804c36f929ecb911e20baf8468bd48e8f86c83ebf7f41b542ffd973669ad
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:6c:76:80:a1:69:b6:92:0c:84:03:70:64:1a:5e:a9:0e:d6:f7:b8]
            modulus: b538aace52d8d87d8a7b3800fda2de4cdc142f186eb8e9bf9334c4162a0252c47f886104b37b060d039b663fade76fe4161cc5094cf200b7f3c730429f512de1d1a793cf746a386595d859f21870dfb0b59705fe6f335588e180d1205cf24a6e3a197cdf60c3f79109e7fd0c9291d3d828705b3124db98ca3f8d5c1df6e2e15e28270b6b5f9d95de33c9c83a7489481553a69a9edb9aadceeb9bda2ba45a118960f4ba72e32c82a261e5ac363f59bd56faebe73ed4c8461b12578efde1463d516e77492c6192157d47eb075ab946a8aab8730244e09bcd50dffb93a432a349dda83ac268377ed13c2c4051eb7ba61e1f7899228d998d45d9546f5f0eebe37711
    public exponent: 10001

] 
2021-10-24 04:12:53.974  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:12:53.975 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:12:53.976 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:12:53.977 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:12:53.977  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:12:53.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:12:53.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:12:53.978 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:12:53.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:12:53.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:12:53.985 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:12:53.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:12:53.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:12:53.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:12:54.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:12:54.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:12:54.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:12:54.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:12:54.119  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:12:54.119  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:12:54.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:12:54.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:12:54.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:12:54.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:12:54.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:12:54.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:12:54.123 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:12:54.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:12:54.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:12:54.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:12:54.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [4b:4d:b9:5b:37:fb:57:90:c8:d7:44:0e:3b:a2:6e:04:5b:9e:5c:c2]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:14:06.870  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:14:06.872 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:14:06.873 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:14:06.874 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:14:06.874  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:14:06.875  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:14:06.875  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:14:06.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:14:06.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:14:06.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:14:06.882 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:14:06.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:14:06.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:14:06.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:14:07.020  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:14:07.020  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:14:07.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:14:07.021 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:14:07.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:14:07.022  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:14:07.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:07.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:07.023 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:07.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:07.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:07.024 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:07.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:07.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:07.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:07.026 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:14:07.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:a0:9f:9d:fb:52:38:cc:82:bc:c3:5a:9f:cb:c3:7b:0d:8f:d0:b4]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:14:18.825  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:14:18.827 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:14:18.828 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:14:18.828 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:14:18.829  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:14:18.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:14:18.829  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:14:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:14:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:14:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:14:18.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:14:18.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:14:18.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:14:18.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:14:19.155  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:14:19.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:14:19.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:14:19.156 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:14:19.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:14:19.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:14:19.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:19.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:19.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:19.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:19.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:19.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:19.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:14:19.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:14:19.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:14:19.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:14:19.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:73:05:36:bf:91:ac:24:c4:d8:e6:e9:2f:6b:0c:4a:8e:88:04:7d]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:17:45.159  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:17:45.161 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:17:45.162 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:17:45.163 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:17:45.163  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-24 04:17:45.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:17:45.164  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:17:45.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:17:45.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:17:45.165 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:17:45.169 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:17:45.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:17:45.170 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:17:45.171 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:17:45.320  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:17:45.321  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:17:45.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:17:45.322 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:17:45.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:17:45.325  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:17:45.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:17:45.326 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:17:45.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:17:45.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:17:45.327 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:17:45.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:17:45.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:17:45.328 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:17:45.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:17:45.329 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:17:45.332 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: bfe4f9aa02fb63aba595f4b0e4e3a542b970109981d4b734b1d87401bbafeb8c12274c32700f0c78104860f5fad7ae634a6aaa81a3809f2a5f6fcdd4672c85085b72a3036a8c6efe51ba4c1ac998c25a854a95e479d93001070e345aa1b5a3bcdb2e64cdca90b2a4a834be49d9fb2cc51a495703f86e70926d22ded30eb977bb2cc8ea0fb01855ae45016c96bb3a7439a93c27efbd50157c9d0a6c491fe561d162e8cfb3dfb832ea259b53f1cefef176e7e248cd394bc04ec575a51a8adfc0ecec2b4a0f23a9f87848d8d5bb5b050ca011d7a2d669603866daa32dc89e105d4c58b2a6265ad1f6f5ddf9fb5022c58c743aabe74526d6fd80d1eb60f8ddf66ce26c555dcee0fc1d037938ea18a87200e51c23d15c2429417b31955334f817318cd2826d4f8246c5a7e43b09c71d16c4df2421c80bbab4aae7ab39a6f6012ded896d532a6d348f8f2ca567000c2d2a591802bd9285047c1e646a865a5eb71e95ef0668804c36f929ecb911e20baf8468bd48e8f86c83ebf7f41b542ffd973669ad
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9e:62:bb:6d:b3:f5:2f:55:04:77:88:02:ef:9c:ce:ff:94:a9:6a:ef]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:18:55.456  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:18:55.457 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:18:55.458 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:18:55.458 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:18:55.459  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-24 04:18:55.459  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:18:55.460  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:18:55.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:18:55.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:18:55.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:18:55.466 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:18:55.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:18:55.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:18:55.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:18:55.625  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:18:55.626  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:18:55.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:18:55.627 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:18:55.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:18:55.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:18:55.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:18:55.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:18:55.630 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:18:55.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:18:55.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:18:55.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:18:55.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:18:55.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:18:55.633 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:18:55.634 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:18:55.636 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2d:37:f4:69:3c:0a:c2:e3:31:2c:53:d5:92:e3:5d:0c:7a:11:72:4e]
            modulus: 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
    public exponent: 10001

] 
2021-10-24 04:20:27.985  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-24 04:20:27.987 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-24 04:20:27.988 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-24 04:20:27.989 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-24 04:20:27.989  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-24 04:20:27.990  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-24 04:20:27.990  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-24 04:20:27.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-24 04:20:27.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-24 04:20:27.991 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-24 04:20:27.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-24 04:20:27.998 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:20:27.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-24 04:20:27.999 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:20:28.114  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-24 04:20:28.115  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-24 04:20:28.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-24 04:20:28.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-24 04:20:28.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-24 04:20:28.117  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-24 04:20:28.117 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:20:28.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:20:28.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:20:28.118 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:20:28.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:20:28.119 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:20:28.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-24 04:20:28.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-24 04:20:28.120 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-24 04:20:28.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-24 04:20:28.124 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 143594066952421047845144632919142062869952258111
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Oct 24 01:46:02 UTC 2021
           Final Date: Fri Oct 24 01:46:01 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [8a:09:9c:55:2e:2b:1b:d8:0f:f1:ed:08:5f:8c:87:c7:ac:62:0b:6d]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 5dfe4a61b78b9bb916b89dd439f7fb3fab4d4d66
                       2881d5d8fd60d5f20cacb92a076633765f09e7c5
                       719d8ee25d153d0f3491a3e3a0c726119449d765
                       70debe36eac50b0af94482af92de98bdb440aa3b
                       a62c7d77108ef256cb389d506651457449b1531b
                       b4e916dd3ae00bd4bcda503ff2bf9975951823a0
                       d21cd9b6e94cfabb6876c59214325560a38d065f
                       e8dd4b3c770578548299b3c5b8896516d8f11f6f
                       99b22a17ef4d34ee2818a3deff2bf2fc877ccfa2
                       959dff59bdf16b085b76577e237ef28acdb2ebd2
                       a1837d0565c320aa6039c9952e414bce24593990
                       d7c103df12eabbd2963a2d9e96c32051a2be6813
                       39432f807040faf95b815a2d1e760326a23f0d6f
                       871a0d5e5f5260b139affca7cf9e1ccd222d32ed
                       e93f0404d343cfb39b4a5e1a5362c4a0248fbc31
                       57aba3b1a35bba9c80a4e3b98a40226d0db268a5
                       0d70951af5b065ec8d9e42d07628920928963d5f
                       2fbb9a658e5082507f45c8fc589220e85abed9c0
                       3c898d7e6dbec763a6426e34f0a0d981da488468
                       e4d765f3
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3c:30:7a:2c:55:d5:fd:4a:fb:17:72:36:33:10:f5:4a:35:8a:86:c4]
            modulus: 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
    public exponent: 10001

]