Results

By type

          2022-05-30 03:02:45,653 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-05-30 03:02:46,353 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-05-30 03:02:47.025  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
May 30, 2022 3:02:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
May 30, 2022 3:02:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
May 30, 2022 3:02:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
May 30, 2022 3:02:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-05-30 03:02:48.809 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-05-30 03:02:49.002  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-05-30 03:02:49.124  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-05-30 03:02:49.645 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-05-30 03:02:49.648 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-05-30 03:02:49.649 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-05-30 03:02:49.653 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-05-30 03:02:49.694 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-05-30 03:02:49.697 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-05-30 03:02:49.798 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-05-30 03:02:50.322 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
May 30, 2022 3:02:50 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-05-30 03:02:50.992  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 6.01 seconds (JVM running for 7.24)
May 30, 2022 3:03:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-05-30 03:03:34.752  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 03:03:34.759 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 03:03:34.791 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-30 03:03:34.796 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 03:03:34.822  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-05-30 03:03:34.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 03:03:34.824  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 03:03:34.825 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 03:03:34.826 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 03:03:34.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 03:03:34.832 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 03:03:34.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 03:03:34.871 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 03:03:34.877 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 03:03:34.878 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 03:03:34.881 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 03:03:35.430  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 03:03:35.433  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 03:03:35.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 03:03:35.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 03:03:35.441  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 03:03:35.442  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 03:03:35.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 03:03:35.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 03:03:35.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 03:03:35.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 03:03:35.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 03:03:35.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 03:03:35.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 03:03:35.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 03:03:35.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 03:03:35.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 03:03:35.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: d7e8d0239dfe703b1edeec9aad667ac1acf75d81a52f8281851765be898cb8ea16f18beb9f0ff72ef6d8430f2e47734e4bb66e79d2fd556cb641bfbdb65c1fdf881d3a7297834254bd5ad6a7189b34e3f1e024120dd913a3c074f53139296f534a2fe926b780209bdad3d12c9176da4e3c6899529a875a3de92ee4f83a577b805b684ec77b4b7fc42be742d91c97e945871672c686d3521e4fd32e181c8bd06780fed8d01b95ddb822ad9e1e8fc368d3d31b60359e5b33af376518069242772b39ad858c6b8ce56e680b725c00f70dace9367e332df3e88b5c66065e4c70aad3b9a8b3d1dbd77a43cefe428d7ed229c4d5bdd3dd5c8bd67df2f72e162976271bc008600b03adc2d957346ca189240d6f9656eb8e30a96ab5546de922ffca4f23963d5b1be812ce6fea0d7fd0b5c991553eef0e77d0f4c09e2b050ffc17bdddfff37208bc4a304dccb3e95448d069c03737928320c11954dea4311aefd16152b7085a51ec154a0b8be3f5f8c604fc28fbf2420a5b55edf933a47f5ceed28b328d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [e4:08:59:15:a8:78:c5:b2:04:f0:72:f1:a1:06:30:3c:ac:6f:d9:80]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:15:50.842  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:15:50.844 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:15:50.846 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:15:50.847 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:15:50.848  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:15:50.849  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:15:50.849  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:15:50.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:15:50.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:15:50.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:15:50.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:15:50.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:15:50.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:15:50.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:15:51.047  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:15:51.048  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:15:51.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:15:51.049 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:15:51.053  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:15:51.054  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:15:51.054 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:15:51.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:15:51.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:15:51.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:15:51.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:15:51.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:15:51.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:15:51.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:15:51.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:15:51.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:15:51.070 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [19:b0:db:e5:bb:1e:c7:a1:e3:2c:f4:5a:64:10:37:b8:7a:37:1a:81]
            modulus: f8ae586737c1540969cf557a70724b196fdf8209ec3fdd4f1993ea1c0a40adfc1b6805972eafef8859d394992f1a653330c9280a0e028d16fd6ad5f5747bb60632735ffb658d1993009d080e3a486687368b4e01007b65e7410ad5d786bb49b9ae779c5e0dee0341a7d0d8f2e0737345ba15137f2bf23887aafddeb2fabcfedce9aa1cfafd17243df25af62add19263fcf62f7404bbeb5661dd9090d4ed9d726943894a1ddd00e059e1b5f6e3bef2c8b86c72592161bf328ccfe57d33b8160d8ad575c54b04f0e587a6ecad6b92d13091af8a2f1bc25c215769e1c439dff9d45cf4dc79a9cf5aef1d08c0f1ad761075a76e82da5a8746d4872725567a8a53d77
    public exponent: 10001

] 
2022-05-30 04:17:22.519  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:17:22.520 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:17:22.522 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-30 04:17:22.523 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:17:22.523  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-05-30 04:17:22.523  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:17:22.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:17:22.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:17:22.524 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:17:22.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:17:22.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:17:22.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:17:22.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:17:22.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:17:22.698  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:17:22.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:17:22.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:17:22.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:17:22.702  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:17:22.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:17:22.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:17:22.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:17:22.703 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:17:22.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:17:22.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:17:22.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:17:22.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:17:22.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:17:22.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:17:22.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:17:22.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [32:9f:1a:ee:92:2a:cf:16:b9:f1:0c:68:ec:2a:d3:3c:10:cd:d8:87]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:18:21.957  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:18:21.958 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:18:21.959 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-30 04:18:21.960 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:18:21.961  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-05-30 04:18:21.961  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:18:21.962  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:18:21.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:18:21.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:18:21.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:18:21.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:18:21.966 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:18:21.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:18:21.967 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:18:22.083  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:18:22.084  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:18:22.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:18:22.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:18:22.086  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:18:22.086  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:18:22.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:18:22.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:18:22.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:18:22.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:18:22.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:18:22.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:18:22.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:18:22.088 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:18:22.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:18:22.089 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:18:22.092 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [73:b0:8e:0d:b3:34:0e:9d:a3:f9:de:09:a2:ba:32:fa:46:55:39:6b]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:20:09.414  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:20:09.415 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:20:09.417 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:20:09.418 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:20:09.419  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:20:09.420  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:20:09.420  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:20:09.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:20:09.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:20:09.421 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:20:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:20:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:20:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:20:09.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:20:09.567  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:20:09.567  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:20:09.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:20:09.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:20:09.569  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:20:09.570  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:20:09.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:20:09.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:20:09.570 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:20:09.571 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:20:09.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:20:09.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:20:09.572 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:20:09.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:20:09.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:20:09.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:20:09.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:63:b8:25:3c:48:81:92:0d:4f:f9:13:2a:14:73:21:02:54:19:f2]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:23:34.364  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:23:34.368 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:23:34.372 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:23:34.373 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:23:34.373  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:23:34.374  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:23:34.374  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:23:34.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:23:34.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:23:34.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:23:34.380 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:23:34.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:23:34.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:23:34.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:23:34.536  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:23:34.537  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:23:34.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:23:34.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:23:34.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:23:34.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:23:34.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:23:34.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:23:34.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:23:34.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:23:34.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:23:34.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:23:34.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:23:34.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:23:34.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:23:34.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:23:34.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: d7e8d0239dfe703b1edeec9aad667ac1acf75d81a52f8281851765be898cb8ea16f18beb9f0ff72ef6d8430f2e47734e4bb66e79d2fd556cb641bfbdb65c1fdf881d3a7297834254bd5ad6a7189b34e3f1e024120dd913a3c074f53139296f534a2fe926b780209bdad3d12c9176da4e3c6899529a875a3de92ee4f83a577b805b684ec77b4b7fc42be742d91c97e945871672c686d3521e4fd32e181c8bd06780fed8d01b95ddb822ad9e1e8fc368d3d31b60359e5b33af376518069242772b39ad858c6b8ce56e680b725c00f70dace9367e332df3e88b5c66065e4c70aad3b9a8b3d1dbd77a43cefe428d7ed229c4d5bdd3dd5c8bd67df2f72e162976271bc008600b03adc2d957346ca189240d6f9656eb8e30a96ab5546de922ffca4f23963d5b1be812ce6fea0d7fd0b5c991553eef0e77d0f4c09e2b050ffc17bdddfff37208bc4a304dccb3e95448d069c03737928320c11954dea4311aefd16152b7085a51ec154a0b8be3f5f8c604fc28fbf2420a5b55edf933a47f5ceed28b328d
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a4:9e:8f:17:a1:ce:c4:f9:ff:5f:a9:12:fc:51:76:48:b1:16:d3:6f]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:28:17.200  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:28:17.201 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:28:17.203 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:28:17.204 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:28:17.205  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:28:17.206  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:28:17.206  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:28:17.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:28:17.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:28:17.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:28:17.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:28:17.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:28:17.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:28:17.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:28:17.347  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:28:17.347  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:28:17.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:28:17.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:28:17.348  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:28:17.349  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:28:17.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:28:17.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:28:17.349 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:28:17.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:28:17.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:28:17.350 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:28:17.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:28:17.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:28:17.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:28:17.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:28:17.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [39:d9:1f:03:5b:8e:e0:44:7a:22:21:c1:76:de:03:d0:49:3c:9e:f3]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:31:34.376  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:31:34.378 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:31:34.380 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-30 04:31:34.382 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:31:34.383  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-05-30 04:31:34.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:31:34.384  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:31:34.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:31:34.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:31:34.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:31:34.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:31:34.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:31:34.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:31:34.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:31:34.532  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:31:34.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:31:34.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:31:34.533 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:31:34.535  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:31:34.535  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:31:34.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:34.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:34.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:34.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:34.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:34.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:34.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:34.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:34.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:34.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:31:34.541 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9d:26:71:a2:93:ba:9a:4f:54:c5:83:6a:d8:0d:59:4d:93:c3:91:9e]
            modulus: c2149b34fd0a30883f6794ab11bf522b639996d6b297b98981e9b0fe8217440cfdfada8036d1af61e8660092a06ca7f9a14c4b4770cb28edfbcd52ac16b3a6953160889f8f2d666b4c10554e378f071305b4d19a3b18c2185a659b35a8c32d2a0b914cb6fdaf19009d8e3f1e1758f4530b346238b805b95a55f1ac38596442fde3d73d04c5565d7ad963bd7e5c9221163c37498d51f67f87117e71c45da68910b2a5dead1c45111eaba600bb50c807ea9133de768046a82d96af25e3397c514aea44219b55e97af1242a8fc696c341afaac18a30bc3a8190f1d65ce5c78d7846a15fe137452bc3740352d390bf376962dcaefab6331c78aa1729717ff078b7d5
    public exponent: 10001

] 
2022-05-30 04:31:58.714  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:31:58.715 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:31:58.716 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:31:58.716 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:31:58.716  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-05-30 04:31:58.717  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:31:58.717  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:31:58.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:31:58.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:31:58.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:31:58.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:31:58.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:31:58.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:31:58.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:31:58.813  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:31:58.813  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:31:58.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:31:58.814 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:31:58.815  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:31:58.815  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:31:58.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:58.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:58.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:58.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:58.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:58.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:58.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:31:58.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:31:58.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:31:58.817 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:31:58.821 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [8f:eb:38:82:3a:38:de:02:42:95:4b:e4:23:ce:56:dc:d5:c9:d6:d7]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:36:17.989  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:36:17.991 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:36:17.994 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-30 04:36:17.995 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:36:17.996  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-05-30 04:36:17.996  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:36:17.996  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:36:17.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:36:17.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:36:17.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:36:18.003 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:36:18.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:36:18.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:36:18.004 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:36:18.156  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:36:18.156  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:36:18.157 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:36:18.157 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:36:18.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:36:18.158  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:36:18.158 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:18.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:18.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:18.159 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:18.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:18.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:18.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:18.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:18.160 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:18.161 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:36:18.164 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a2:5c:86:b2:39:bc:2b:a9:d9:14:29:5a:c5:13:ed:87:57:9b:16:01]
            modulus: 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
    public exponent: 10001

] 
2022-05-30 04:36:30.844  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-05-30 04:36:30.844 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-05-30 04:36:30.846 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-30 04:36:30.846 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-05-30 04:36:30.846  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-05-30 04:36:30.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-05-30 04:36:30.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-05-30 04:36:30.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-05-30 04:36:30.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-05-30 04:36:30.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-05-30 04:36:30.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-05-30 04:36:30.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:36:30.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-05-30 04:36:30.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:36:30.992  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-05-30 04:36:30.994  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-05-30 04:36:30.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-05-30 04:36:30.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-05-30 04:36:30.995  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-05-30 04:36:30.996  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-05-30 04:36:30.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:30.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:30.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:30.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:30.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:30.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:30.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-05-30 04:36:30.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-05-30 04:36:30.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-05-30 04:36:30.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-05-30 04:36:31.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 15197065822717590712319887734506219990212021612
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Mon May 30 03:01:00 UTC 2022
           Final Date: Sat May 29 03:00:59 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [c2:89:04:35:b7:93:6a:d8:81:1d:91:9a:68:c4:de:f9:e2:0a:2e:e5]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 62fd19b3403a7b4cbef7ea656d0e3f6a8b77060f
                       809ac9b2d8beebb0a654243f09b0ecff4d960e25
                       2b1ff071f2425fa698c055b0b6a42ae10a8a1a22
                       b47800604cffc66eaa509965dc314b24f7b0f127
                       b73c8a8208987da79e88e20e82f651117b745222
                       96a0c9b17e8cd18602dae2a32684a639530db4b2
                       9c98d4eed9435cb3e41ed0c20d4cd3fb20100ff1
                       ffeef6fa26aa1ad6395ea975fd873963872c140e
                       1b2d5ae75078c5fd82b65cbf73f6678f7bffe285
                       985e24bd517b8934b0a19e5814a280c936e65e3d
                       dff07fcc8d55ec6bcfa2225ddc2a2b5921b0eff9
                       94b4691c413b22430ba0db0bf7379aafbefb9aed
                       9df0e580094f2b8e6a9af2fb967faf7334ce84e7
                       6e463ce4b988bcb453d85e8c17b5c4aeed54be69
                       f6c4ace8027c668e6224c37be0ef0abd8dbeced7
                       abbda8a1c9ecfe466c0941cdbaa897ddffe9a34b
                       75c314433c05db7288b82487f861c2a12b307f76
                       e844879e82af56164c724820b753a65345b77024
                       eb47a7cfa1911da3ae3ba474047b817ddfa2fd62
                       7bfb578a
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [38:d8:61:56:91:dc:64:c0:76:5d:ba:de:38:3f:8c:ce:c2:2e:86:03]
            modulus: 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
    public exponent: 10001

]