Results

By type

          2021-11-08 01:58:03,839 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2021-11-08 01:58:08,838 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::        (v2.2.4.RELEASE)

2021-11-08 01:58:11.946  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
2021-11-08 01:58:26.238 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2021-11-08 01:58:27.552  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2021-11-08 01:58:28.158  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2021-11-08 01:58:40.347  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 38.799 seconds (JVM running for 46.898)
2021-11-08 02:01:26.244  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 02:01:26.337 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 02:01:26.539 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-08 02:01:26.544 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 02:01:26.645  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2021-11-08 02:01:26.648  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 02:01:26.731  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 02:01:26.735 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 02:01:26.736 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 02:01:26.739 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 02:01:26.747 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 02:01:26.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 02:01:26.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 02:01:26.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 02:01:26.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 02:01:26.947 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 02:01:28.531  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 02:01:28.534  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 02:01:28.535 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 02:01:28.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 02:01:28.545  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 02:01:28.546  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 02:01:28.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 02:01:28.547 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 02:01:28.548 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 02:01:28.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 02:01:28.639 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 02:01:28.640 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 02:01:28.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 02:01:28.648 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 02:01:28.649 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 02:01:28.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 02:01:28.849 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:ea:6a:13:e6:06:d9:fb:5d:2d:98:35:c8:ac:99:e7:ee:42:c3:8a]
            modulus: be277a8504f7a229ae45a60bff3840302ae0b284495fa844b4f66950de73c0761bc561a0d58b7e23b4988f732c0e282c7e02acabb461ef339f3ac1ed3027724e20cccb3ffd103d622e74a8bb777bd17c0675b2ff3a48557818882da7b687992035d8cc54c0a5bf4d3a67d950c7d77c0f9c0e011cb9fafdbe4822f229606f4a89cbd6ea94101b620d2015d0edaf98a0facf5dd24572eb9187fac81217212604002e378c04b30a66a2d68c263349f4c73f332f3f4a4cbe39e2e9dba23f8e7daaf5333e376038e1ba44a03fe9248d9ef80415b7b1887c45fb1ded0c80c8479048758c832584177ecf1d5bcc11a6914290a816d5e71e9cd945f7fae5b96e968bfeaf
    public exponent: 10001

] 
2021-11-08 05:08:46.110  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:08:46.112 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:08:46.114 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-08 05:08:46.116 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:08:46.117  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2021-11-08 05:08:46.118  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:08:46.119  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:08:46.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:08:46.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:08:46.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:08:46.149 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:08:46.151 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:08:46.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:08:46.152 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:08:46.393  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:08:46.431  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:08:46.432 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:08:46.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:08:46.436  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:08:46.437  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:08:46.437 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:08:46.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:08:46.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:08:46.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:08:46.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:08:46.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:08:46.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:08:46.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:08:46.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:08:46.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:08:46.449 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:2a:53:b0:72:0d:00:8c:08:53:b6:17:6f:c0:f4:6a:54:e3:5d:c5]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:10:23.209  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:10:23.210 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:10:23.212 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 05:10:23.212 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:10:23.213  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 05:10:23.214  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:10:23.214  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:10:23.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:10:23.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:10:23.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:10:23.237 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:10:23.238 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:10:23.238 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:10:23.239 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:10:23.450  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:10:23.450  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:10:23.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:10:23.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:10:23.453  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:10:23.454  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:10:23.454 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:10:23.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:10:23.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:10:23.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:10:23.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:10:23.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:10:23.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:10:23.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:10:23.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:10:23.458 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:10:23.533 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [6b:13:e8:2f:a3:d1:25:a7:78:c4:24:e8:80:3f:32:58:2e:b3:91:a4]
            modulus: b58c6003d77d0b17b7d65a712420c6d70cde696b6c79cd579ed1e0f4882e622e7eeedebd988e3d1e06a6730e209e1cdaa6c5f00a7d602d88e3b079fbc0a626c2cdca791230a9281203c1d4c59fe63fde628ce87f2f4490bffe802b6a7a643f87fc71fd467f83e386269749fb4cce4191908e4c00ab91ba35a9a3cee89632d2590570b219783d94830e72367e801456a9379304cc11fe22a2341bd3a032cf177f4a6946839fc05155e66357c20210f83200dea4c7614767dba27a00fd0e6ed2be3215f64deb32e1653503f9eac5a067670486957b929c56faa05a54f157834d3635517e720d2013789b6fe38153a125e1c5f63a32254021a45ea1298b1721ba0f
    public exponent: 10001

] 
2021-11-08 05:13:15.320  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:13:15.321 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:13:15.323 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 05:13:15.324 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:13:15.325  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 05:13:15.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:13:15.326  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:13:15.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:13:15.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:13:15.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:13:15.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:13:15.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:13:15.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:13:15.334 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:13:15.532  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:13:15.533  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:13:15.533 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:13:15.534 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:13:15.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:13:15.536  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:13:15.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:15.537 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:15.538 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:15.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:15.539 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:15.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:15.540 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:15.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:15.541 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:15.542 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:13:15.545 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7a:5b:8c:13:82:58:5a:16:38:cb:53:d0:f1:14:54:9d:01:55:3e:96]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:13:34.100  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:13:34.102 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:13:34.103 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 05:13:34.104 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:13:34.104  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2021-11-08 05:13:34.105  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:13:34.131  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:13:34.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:13:34.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:13:34.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:13:34.140 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:13:34.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:13:34.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:13:34.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:13:34.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:13:34.225  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:13:34.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:13:34.231 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:13:34.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:13:34.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:13:34.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:34.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:34.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:34.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:34.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:34.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:34.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:13:34.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:13:34.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:13:34.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:13:34.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [28:ad:14:5c:3f:e0:cf:53:80:9e:7f:22:97:ea:97:27:3c:12:95:e5]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:14:06.509  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:14:06.511 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:14:06.512 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-08 05:14:06.512 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:14:06.513  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] }
2021-11-08 05:14:06.513  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:14:06.514  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:14:06.514 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:14:06.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:14:06.515 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:14:06.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:14:06.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:14:06.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:14:06.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:14:06.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:14:06.612  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:14:06.612 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:14:06.613 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:14:06.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:14:06.632  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:14:06.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:06.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:06.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:06.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:06.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:06.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:06.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:06.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:06.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:06.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:14:06.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: c04db1d41729040f033b6c958c1d550dac40631811b81a54ec80ed59bbb058290b8852c188f37ad9cb3a117a5479620c89d495c1e1afc4f8f7450c367e4b790d9db6174b5193af9953ca312b3fe3fa0a40afe804590626bbe683cafa6c9b643e3cc73cf96b2dd8ea7abd2b2b84380846554df8c8052d86bc9d150399a1e7a67f9e993b13e4e6c7e58425decfb42b0a775fe74796ca04327d494866718566d9d5c975234b874c17ce09cb260242de7988afac8e398d9aee2e1888f6831e08c0eed8f10afa5f04c9e7422993eb070956fd839d4ba588926f7a8d3b6c509b1d64b1f176f5ee94d7d78f2bb708999012e691d1698b0c5258b58130ffb120f1e980c849299304afccd4fbc1a92f7773f6d76a5c792a9673c7f93b09d9f43d967d3d4b2e3033dfee874dc23e489d1b402301bdebde805f2d653a305f06aa20ec03f00dc256e75d1b937970fdeaeccede9dd5f5edd12094ee5911137a1b47fce3708917fabb0dac25af5e0043109f90651746c308c9069e31af5be87146f17a5c0c502d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bf:bd:4a:ed:e6:f3:cb:5d:39:ed:7f:ea:46:d9:f2:69:d1:66:86:e8]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:14:39.963  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:14:39.965 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:14:39.967 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-08 05:14:39.967 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:14:39.968  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] }
2021-11-08 05:14:39.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:14:39.969  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:14:39.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:14:39.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:14:39.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:14:39.973 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:14:40.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:14:40.031 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:14:40.032 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:14:40.129  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:14:40.131  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:14:40.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:14:40.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:14:40.134  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:14:40.134  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:14:40.135 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:40.135 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:40.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:40.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:40.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:40.137 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:40.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:14:40.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:14:40.139 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:14:40.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:14:40.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [79:ae:50:d7:7e:b5:34:83:c6:1e:ed:da:20:00:02:04:80:95:0b:3a]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:16:06.959  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:16:06.960 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:16:06.962 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-08 05:16:06.962 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:16:06.963  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] }
2021-11-08 05:16:06.963  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:16:06.964  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:16:06.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:16:06.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:16:06.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:16:06.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:16:06.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:16:06.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:16:06.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:16:07.134  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:16:07.135  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:16:07.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:16:07.135 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:16:07.137  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:16:07.137  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:16:07.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:07.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:07.138 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:07.139 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:07.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:07.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:07.140 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:07.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:07.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:07.142 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:16:07.145 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [cd:e2:ec:de:c3:70:22:01:41:ed:f6:57:66:74:71:71:22:ce:2e:b3]
            modulus: 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
    public exponent: 10001

] 
2021-11-08 05:16:25.764  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2021-11-08 05:16:25.765 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2021-11-08 05:16:25.766 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 05:16:25.767 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2021-11-08 05:16:25.767  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] }
2021-11-08 05:16:25.767  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2021-11-08 05:16:25.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2021-11-08 05:16:25.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2021-11-08 05:16:25.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2021-11-08 05:16:25.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2021-11-08 05:16:25.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2021-11-08 05:16:25.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:16:25.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2021-11-08 05:16:25.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:16:25.862  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2021-11-08 05:16:25.863  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2021-11-08 05:16:25.863 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2021-11-08 05:16:25.863 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2021-11-08 05:16:25.865  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2021-11-08 05:16:25.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2021-11-08 05:16:25.866 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:25.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:25.867 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:25.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:25.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:25.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:25.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2021-11-08 05:16:25.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2021-11-08 05:16:25.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2021-11-08 05:16:25.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2021-11-08 05:16:25.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 39841132761934542190408590298459203539465127959
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon Nov 08 01:54:38 UTC 2021
           Final Date: Sat Nov 08 01:54:37 UTC 2031
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d4:87:96:0e:e6:9c:4d:5f:60:1c:98:cc:94:d7:40:7f:c9:0f:43:1e]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 06be82521a95eca0a8ca313148f9fa90d719b33e
                       e4519fa7a031445325a4870d7b8a407c72cb2d5f
                       65f5e73f8bdd3a913db9cb373e4ac398cb6e0275
                       603675a9b0de5821eafe8206daeb5bf78f8681b8
                       5a52d448fa38a243f7575dc140b7786db136e24b
                       23f55c752b5a26730d4e5d9f8a103db13c63bb5b
                       f119464727640c9d617201c6e835cb4c7d4ae125
                       c06adf5891e0649d66535f0e3525bbce7034e285
                       6079e1c5e6c1409957c72c863a432b246479d12a
                       cce1c5fd98097b9c32ed6ed995cde18621029b31
                       7158662c738c3e5a3954537a9051bef29c5b60bb
                       55879779354ebb8e2663c0a82811b134169e1726
                       7b18e5bd6f88c57bce3b156e777a8a240c86eb10
                       0151a7b97f32fa781fea14bb3c2e51cc882c639e
                       832f7f653f3bf10f5f88cc18c24cb20ce5ffd742
                       6a070c28a9fcc10b246d497075543f8f801a1620
                       adc3eeaaf30718b408fcaed7b745e0bbf9e27b07
                       60910b2e11c614a7cd1c5776726359c97a84236b
                       d45f9631d6fa7da94489779b5f6a594a4dd8f311
                       54674b66
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9a:ef:c0:55:f4:e2:a8:01:60:dc:93:c1:c3:a4:07:61:46:f7:fe:9c]
            modulus: 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
    public exponent: 10001

]