Results

By type

          2021-10-30 01:39:36,342 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-10-30 01:39:40,743 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-10-30 01:39:43.549  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-10-30 01:39:57.549 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-10-30 01:39:59.045  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-10-30 01:39:59.739  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-10-30 01:40:12.644  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.797 seconds (JVM running for 46.589)
2021-10-30 01:40:56.338  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 01:40:56.345 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 01:40:56.536 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-30 01:40:56.539 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 01:40:56.548  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-10-30 01:40:56.632  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 01:40:56.634  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 01:40:56.638 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 01:40:56.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 01:40:56.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 01:40:56.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 01:40:56.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 01:40:56.855 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 01:40:56.931 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 01:40:56.932 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 01:40:56.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 01:40:58.374  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 01:40:58.377  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 01:40:58.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 01:40:58.379 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 01:40:58.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 01:40:58.386  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 01:40:58.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 01:40:58.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 01:40:58.387 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 01:40:58.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 01:40:58.530 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 01:40:58.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 01:40:58.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 01:40:58.533 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 01:40:58.639 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a7:db:ef:a1:dc:1c:4f:5c:39:f2:2b:a6:cb:35:41:fb:2a:9f:f0:d5]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:35:32.784  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:35:32.785 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:35:32.833 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-30 05:35:32.836 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:35:32.838  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-10-30 05:35:32.839  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:35:32.840  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:35:32.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:35:32.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:35:32.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:35:32.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:35:32.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:35:32.934 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:35:32.935 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:35:33.231  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:35:33.232  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:35:33.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:35:33.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:35:33.239  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:35:33.240  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:35:33.241 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:35:33.332 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:35:33.333 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:35:33.334 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:35:33.335 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:35:33.336 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:35:33.337 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:35:33.338 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:35:33.345 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [99:5c:18:42:82:c0:46:45:8b:94:01:b4:97:c2:99:2e:4e:2c:7a:24]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:40:21.735  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:40:21.736 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:40:21.739 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 05:40:21.741 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:40:21.742  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 05:40:21.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:40:21.743  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:40:21.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:40:21.743 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:40:21.744 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:40:21.748 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:40:21.749 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:40:21.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:40:21.949  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:40:21.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:40:21.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:40:21.953  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:40:21.954  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:21.955 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:21.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:21.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:21.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:21.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:22.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:40:22.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: adc61c9dbae8ea4da8c74bfc16b9563f008fc74bf7ac7bb2b824d799dbc4ae8e7f0d1f539d24269b45320411d4056384c0a72daf5370b6aada92a976a9536bf2e3419f8afee5280d7ecf07a22c8974d5f7086573f891921cac12843fe35d866b2e0b406a99b4f909b80898a55b0e9dd0c2320c127e3b879cb3db682e3d9a84615108ce90f96fa7e703bd46af055a28b3d70e22278c7213076aa50741225a9580956010965468d45eba59cbaea6890f719e7b8e12a71759b1b658e3bcca6448ee35983360875a9a198c39233256c9fa8787527fbeba1a62b616b102d1c3d17e702c7e1fea9197da56c810bb27f34f7051826bfd38d0d43096143fac548941f338f7bec2bdcb7b5c2af22c305aa2486f7240a05e96550bfbbc0def25a6d3f1e59efd8f1f0d0367442740b503663123f047ddcc6750c4a346d16c6acac27d3555a41d7eed7dbb2882f085e99714efd2e99bc7d76a9068c517eb2c99d3985eb5e2cdaff48ff834aa7c69faf49f85c6ce22c3fdae7cc68afdb3d53d627bed2c17d123
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c2:21:08:17:f7:b2:9d:be:ad:6a:ca:17:05:20:35:06:80:fe:06:a5]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:40:55.114  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:40:55.115 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:40:55.117 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-30 05:40:55.117 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:40:55.118  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-10-30 05:40:55.129  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:40:55.130  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:40:55.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:40:55.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:40:55.135 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:40:55.216  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:40:55.217  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:40:55.218 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:40:55.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:40:55.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:40:55.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:40:55.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:55.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:55.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:55.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:55.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:55.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:40:55.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:40:55.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:40:55.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: adc61c9dbae8ea4da8c74bfc16b9563f008fc74bf7ac7bb2b824d799dbc4ae8e7f0d1f539d24269b45320411d4056384c0a72daf5370b6aada92a976a9536bf2e3419f8afee5280d7ecf07a22c8974d5f7086573f891921cac12843fe35d866b2e0b406a99b4f909b80898a55b0e9dd0c2320c127e3b879cb3db682e3d9a84615108ce90f96fa7e703bd46af055a28b3d70e22278c7213076aa50741225a9580956010965468d45eba59cbaea6890f719e7b8e12a71759b1b658e3bcca6448ee35983360875a9a198c39233256c9fa8787527fbeba1a62b616b102d1c3d17e702c7e1fea9197da56c810bb27f34f7051826bfd38d0d43096143fac548941f338f7bec2bdcb7b5c2af22c305aa2486f7240a05e96550bfbbc0def25a6d3f1e59efd8f1f0d0367442740b503663123f047ddcc6750c4a346d16c6acac27d3555a41d7eed7dbb2882f085e99714efd2e99bc7d76a9068c517eb2c99d3985eb5e2cdaff48ff834aa7c69faf49f85c6ce22c3fdae7cc68afdb3d53d627bed2c17d123
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [91:a6:d7:8b:76:bb:96:20:fb:c9:b1:f2:32:30:36:e7:fb:9d:5d:7e]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:41:23.455  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:41:23.456 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:41:23.458 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 05:41:23.458 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:41:23.459  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 05:41:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:41:23.460  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:41:23.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:41:23.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:41:23.533 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:41:23.629  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:41:23.630  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:41:23.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:41:23.630 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:41:23.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:41:23.632  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:41:23.632 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:23.633 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:23.634 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:23.635 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:41:23.638 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [72:6c:f7:d4:ac:ed:79:58:6a:b6:74:62:92:dc:1b:10:92:ca:0e:26]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:41:29.842  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:41:29.843 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:41:29.844 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-30 05:41:29.845 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:41:29.845  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-10-30 05:41:29.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:41:29.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:41:29.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:41:29.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:41:29.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:41:29.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:41:30.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:41:30.017  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:41:30.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:41:30.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:41:30.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:41:30.019  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:30.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:30.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:30.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:30.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:30.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:41:30.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:41:30.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:41:30.026 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:41:30.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f3:c7:73:fa:d9:40:b1:59:77:9c:db:09:c6:a0:5e:12:be:65:14:18]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:42:54.144  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:42:54.145 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:42:54.146 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 05:42:54.147 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:42:54.147  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-10-30 05:42:54.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:42:54.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:42:54.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:42:54.148 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:42:54.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:42:54.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:42:54.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:42:54.234  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:42:54.235  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:42:54.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:42:54.235 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:42:54.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:42:54.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:42:54.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:42:54.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:42:54.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:42:54.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:42:54.242 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:d8:8e:02:1a:26:49:7f:be:b0:fc:65:f4:99:4a:13:46:c5:43:57]
            modulus: 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
    public exponent: 10001

] 
2021-10-30 05:43:12.596  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:43:12.598 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:43:12.601 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 05:43:12.602 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:43:12.602  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-10-30 05:43:12.602  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:43:12.603  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:43:12.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:43:12.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:43:12.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:43:12.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:43:12.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:43:12.731  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:43:12.732  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:43:12.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:43:12.733 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:43:12.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:43:12.734  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:43:12.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:43:12.735 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:43:12.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:43:12.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:43:12.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:43:12.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:43:12.741 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [36:8f:33:85:65:0f:90:0f:8d:f1:27:8b:13:81:e0:a1:d6:ee:a7:7e]
            modulus: c5c6d422f28e90e956614fb6e759ae8e3f7464bec224dc20720c5e5c8abc4414dde3f7c96439b784662d71aeb0d9475c6b27a54c74f0cfc151884eff2c3670921c483f891888d46f42f9c42f9cd09d93561ad608d2919cf414b239a077c206760ad4a8ea5398f39705679e91aede9bc6deb50a543784c61e9a410e2b501c33463890481c04c73e73191942aef94c8246d203ee288c5d32ae64a23ea0369c6e885ce0fad0e4acd2913a23a34e2deb36fdc07338eebdc47d3ab66d2f7d4081564f8a7db3fb7d1c93daf325e057f2d288c544a4dfbf10333dd2492a05f34569e6e3a659826ed01b45c474b032f0a44f2b93c20898f78b9604f51cea36247c911355
    public exponent: 10001

] 
2021-10-30 05:44:47.047  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-10-30 05:44:47.048 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-10-30 05:44:47.050 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-30 05:44:47.050 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-10-30 05:44:47.050  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-10-30 05:44:47.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-10-30 05:44:47.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-10-30 05:44:47.051 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-10-30 05:44:47.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-10-30 05:44:47.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-10-30 05:44:47.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-10-30 05:44:47.058 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:44:47.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-10-30 05:44:47.201  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-10-30 05:44:47.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-10-30 05:44:47.202 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-10-30 05:44:47.204  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-10-30 05:44:47.205  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:44:47.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:44:47.207 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:44:47.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:44:47.208 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-10-30 05:44:47.209 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-10-30 05:44:47.232 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 596874060364761968481743603990132320816506150629
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Oct 30 01:36:01 UTC 2021
           Final Date: Thu Oct 30 01:36:00 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [89:19:a3:9b:0c:c1:08:15:0a:75:18:28:d1:38:f0:27:3c:41:68:d9]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: a378359f5ac7d1c4702c40d3d126c08c5a7e93e6
                       dd655376fc4fdc7e9c9c7441256e04c908bcdd24
                       9d62396f1318bacca223b71a5dd888ae34fccbb3
                       4249f78b7d8115eb5604ef091bc4f68bc14834c2
                       7b1e8386388baf06500fa6c15c0b8bade94d0024
                       31098c947e5e9f7bb4603d895003e40b8e140745
                       a2557376461d033a012cc38716c8e824b25beb91
                       bb3cd4c8cb214042ecbbf52cc7011236bff99deb
                       c33b481fcdd456805cbd7f68cb26439d5592253b
                       dd8a42dacfb5ad2ba702cf182defef5f0dd82995
                       0ec05c8bf4b2821fc67eb8b75159fda86a304f92
                       ca04f97261510ca3002680058b68d8d890df63cd
                       e9c5c10701c3e2a7fb319f56d54060d5e79cc775
                       09777a6a47e53848d986a5e72d6bd8b9b085ee48
                       d88a9037f0009ae0cc243f4b5419b5603160ef2a
                       4dcebb1aff4414e35db3a9d28cb7853119bd9dbe
                       c3d4c907493116359366d09d5c38720603f1025d
                       a777f68593804a4276162062e2df10aff4554f1d
                       db43df0fb8de7f2c845fcd561f84ee27803bdfcd
                       255f376a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e6:12:5d:c0:2a:82:68:17:fe:fa:93:83:55:e8:40:07:a9:84:73:50]
            modulus: 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
    public exponent: 10001

]