Results

By type

          2022-06-09 11:12:27,499 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-09 11:12:28,518 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-09 11:12:29.264  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 09, 2022 11:12:31 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 09, 2022 11:12:31 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 09, 2022 11:12:31 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 09, 2022 11:12:31 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-09 11:12:32.069 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-09 11:12:32.356  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-09 11:12:32.533  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-09 11:12:33.357 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-09 11:12:33.361 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-09 11:12:33.363 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-09 11:12:33.367 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-09 11:12:33.410 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-09 11:12:33.414 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-09 11:12:33.537 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-09 11:12:34.228 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 09, 2022 11:12:35 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-09 11:12:35.408  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.712 seconds (JVM running for 10.507)
Jun 09, 2022 11:13:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-09 11:13:13.113  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 11:13:13.123 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 11:13:13.163 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-09 11:13:13.167 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 11:13:13.187  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-09 11:13:13.190  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 11:13:13.191  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 11:13:13.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 11:13:13.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 11:13:13.197 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 11:13:13.204 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 11:13:13.207 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 11:13:13.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 11:13:13.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 11:13:13.265 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 11:13:13.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 11:13:13.952  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 11:13:13.955  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 11:13:13.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 11:13:13.957 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 11:13:13.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 11:13:13.968  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 11:13:13.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 11:13:13.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 11:13:13.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 11:13:13.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 11:13:13.985 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 11:13:13.985 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 11:13:13.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 11:13:13.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 11:13:13.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 11:13:13.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 11:13:14.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: c200e1d92e6da25e95aeb7ab3698b8e10ab0b95eff73ec8156b613fa0c6db72c3298e7ef97961fafd3d956265ae784a2b8444df663bb42533d4bcc8619901dc6c4dc7699176e9811b82987cb7e5e8e6b7cf3c7b7a70ca6af7bf507ffac7c3411da088c89f6f2ab330af56c1e5154970fb9a577ff5a7a104c88f3ebcc1f62d822f3188a928e2c3333f69183eca1f75d96afa1f21994332a16db7e3c50e5acdfa8b26037882717abca3c182aed8d278ba06471aac5009b2573031f7e8c0827cb4e438f7337474c149c6cdaebeff837127b8c19088362e6e7edc616b9ffa6f4e7593378ff2642f47aaf3f0f649bc49dfffd9ab4f5f893650048cdfaddc63e5d58ca28795bef0b251e6616305869075aeb7e1c2ae6555e32b4ec7322ff6b3a55caf5037d6fd71c391e2ed96f9976f34481f4643123f70dfd329b3e1b1026f1707944bae20ef82ddd59f623088bfe37ed2cf40c0feedd9c2a938f2ba58dde1159fe692b720883cc1a6b8c7cc001ff05176dbf58885561e268112de6b00bd18cfd4bc5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:7b:f1:b9:cb:dc:aa:b9:dc:2e:57:0b:86:90:90:7d:b5:07:e5:1d]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 12:48:34.725  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 12:48:34.729 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 12:48:34.732 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 12:48:34.733 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 12:48:34.734  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 12:48:34.735  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 12:48:34.735  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 12:48:34.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 12:48:34.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 12:48:34.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 12:48:34.751 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 12:48:34.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:48:34.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:48:34.755 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:48:35.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 12:48:35.028  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 12:48:35.028 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 12:48:35.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:48:35.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 12:48:35.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 12:48:35.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:48:35.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:48:35.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:48:35.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:48:35.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:48:35.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:48:35.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:48:35.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:48:35.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:48:35.038 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 12:48:35.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: c200e1d92e6da25e95aeb7ab3698b8e10ab0b95eff73ec8156b613fa0c6db72c3298e7ef97961fafd3d956265ae784a2b8444df663bb42533d4bcc8619901dc6c4dc7699176e9811b82987cb7e5e8e6b7cf3c7b7a70ca6af7bf507ffac7c3411da088c89f6f2ab330af56c1e5154970fb9a577ff5a7a104c88f3ebcc1f62d822f3188a928e2c3333f69183eca1f75d96afa1f21994332a16db7e3c50e5acdfa8b26037882717abca3c182aed8d278ba06471aac5009b2573031f7e8c0827cb4e438f7337474c149c6cdaebeff837127b8c19088362e6e7edc616b9ffa6f4e7593378ff2642f47aaf3f0f649bc49dfffd9ab4f5f893650048cdfaddc63e5d58ca28795bef0b251e6616305869075aeb7e1c2ae6555e32b4ec7322ff6b3a55caf5037d6fd71c391e2ed96f9976f34481f4643123f70dfd329b3e1b1026f1707944bae20ef82ddd59f623088bfe37ed2cf40c0feedd9c2a938f2ba58dde1159fe692b720883cc1a6b8c7cc001ff05176dbf58885561e268112de6b00bd18cfd4bc5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d5:15:19:38:74:27:41:37:4e:17:fc:af:c4:d0:68:23:c5:a5:5a:97]
            modulus: a3d8317fccc242ec5dc3327957792b4af60f7311353d81e642c35f820b867fa0b35422adbbcf428faca6301073db0c70d03ee4de6f3b81701364321b0c7fb95a1836c817215c6e80828b8a5764daa065312525b58a09bdb3d0ef3b68256c5b93ea68789e8e502029dbb0b5550aa53ed497e5a892d99bda1e26ae8123b0e63f864df4a132686f2603ef2e3fa6a596d3665c076a851efc97e8bdab8640ef69a54a937bab1e4b118597f4ce3a7ff135179565df8c827ba1a753a9dfdca71d9240861706b5f1d35f3fd31491515401b5b6cc1aa7ccfd22284482f5ebc4fff5deb355a26c031b425493b24f47b1dcd5ca32a58748b06f261edead33464b45c2275f5b
    public exponent: 10001

] 
2022-06-09 12:50:37.625  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 12:50:37.626 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 12:50:37.628 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-09 12:50:37.629 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 12:50:37.631  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-09 12:50:37.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 12:50:37.632  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 12:50:37.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 12:50:37.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 12:50:37.639 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 12:50:37.654 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 12:50:37.656 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:50:37.657 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:50:37.658 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:50:37.807  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 12:50:37.808  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 12:50:37.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 12:50:37.809 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:50:37.814  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 12:50:37.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 12:50:37.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:50:37.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:50:37.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:50:37.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:50:37.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:50:37.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:50:37.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:50:37.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:50:37.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:50:37.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 12:50:37.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [90:d0:1b:59:72:3e:87:89:1d:98:d9:bb:bb:48:69:75:e4:9c:9b:89]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 12:51:50.422  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 12:51:50.423 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 12:51:50.444 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-09 12:51:50.445 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 12:51:50.446  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-09 12:51:50.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 12:51:50.447  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 12:51:50.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 12:51:50.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 12:51:50.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 12:51:50.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 12:51:50.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:51:50.459 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:51:50.460 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:51:50.654  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 12:51:50.655  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 12:51:50.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 12:51:50.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:51:50.661  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 12:51:50.662  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 12:51:50.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:51:50.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:51:50.663 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:51:50.664 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:51:50.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:51:50.665 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:51:50.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:51:50.666 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:51:50.667 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:51:50.668 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 12:51:50.673 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c7:78:77:79:b4:49:67:24:e5:7d:fd:6a:3a:4f:56:35:b6:66:1c:33]
            modulus: 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
    public exponent: 10001

] 
2022-06-09 12:54:04.466  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 12:54:04.467 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 12:54:04.469 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 12:54:04.470 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 12:54:04.470  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-09 12:54:04.471  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 12:54:04.472  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 12:54:04.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 12:54:04.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 12:54:04.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 12:54:04.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 12:54:04.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:54:04.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 12:54:04.480 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:54:04.669  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 12:54:04.670  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 12:54:04.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 12:54:04.671 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 12:54:04.673  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 12:54:04.674  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 12:54:04.674 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:54:04.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:54:04.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:54:04.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:54:04.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:54:04.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:54:04.678 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 12:54:04.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 12:54:04.679 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 12:54:04.680 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 12:54:04.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [a9:30:04:4b:a8:cd:c2:c8:ee:49:55:42:b2:e6:9c:4d:ee:80:75:f6]
            modulus: c3f62ef788268bd1c301cb7b9e67f34b354012f6d6642b66fc0433efe6ece20e10e6798a2b8cd3e33963ab8b22bcefda9bc26ecbaab027b6698c928acb4df1e98b707e485a59b7472658a693f815b07f786a3ba59c1f4a9771fe477c58a78260461a962be7f8772d07718308167d7e53e55b545e9cd0d8ded5a769e79fd96ce7d6d1df7dc7035586db9f6838b4e545a497a783b4b418646562c932b3bd52c6daa87c87bb85366e6f31eff8c27677a43fe0262d76f827686d8ce78f5b507b4f5295f53093ddbf15fc74380f9650075a44731ee61b7cac97c17727302ae8999123eff3acc94c9d66c67a94f1ee0a0d23cd40414c9c72e32e26c37e94cf33ef117b
    public exponent: 10001

] 
2022-06-09 13:03:58.375  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 13:03:58.378 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 13:03:58.380 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-09 13:03:58.384 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 13:03:58.385  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-09 13:03:58.386  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 13:03:58.387  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 13:03:58.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 13:03:58.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 13:03:58.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 13:03:58.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 13:03:58.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:03:58.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:03:58.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:03:58.587  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 13:03:58.588  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 13:03:58.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 13:03:58.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:03:58.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 13:03:58.590  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 13:03:58.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:03:58.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:03:58.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:03:58.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:03:58.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:03:58.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:03:58.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:03:58.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:03:58.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:03:58.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 13:03:58.598 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f1:0c:fe:b4:d9:36:dd:d3:1b:57:22:41:ee:ce:62:26:f8:5a:32:a3]
            modulus: c5a6da8488b00a05206e2510df898c3c0db6e61cd2140fece4393462871de971f70e683cb2771ac9cc64bec57b8ba2532aaac22897a62cabb524d64716fe6dc86d6d6ef3d826f7a3a902810959fee9cbafbbe18f0cdbcfbb7fbeaeca67ccd502de08d49338ccb3fbd0376d7e4f5798848da994cb9da73bf39ab69b7e4a1b98063f76a18d40f37a2f6c452eb725627ae4c90093ed638d4b4b1888f58f6cb8571461c6a065bd3a4ed92dd3af787b7b978b28ed0d9d7d65179c86068a2679af64715dbef9cf3b0a0bed1680da82080c78643e548d09c46a0e62e3e936c7ef60ae7b36c963eed03175c65dccafb5f2821a87aa2b7d1b9f2fdc3182b5a0e6723e87bb
    public exponent: 10001

] 
2022-06-09 13:08:59.947  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 13:08:59.951 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 13:08:59.959 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-09 13:08:59.962 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 13:08:59.966  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-09 13:08:59.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 13:08:59.968  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 13:08:59.969 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 13:08:59.970 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 13:08:59.972 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 13:08:59.996 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 13:09:00.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:09:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:09:00.001 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:09:00.203  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 13:09:00.205  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 13:09:00.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 13:09:00.205 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:09:00.207  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 13:09:00.208  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 13:09:00.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:00.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:00.209 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:00.210 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:00.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:00.211 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:00.212 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:00.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:00.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:00.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 13:09:00.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: c200e1d92e6da25e95aeb7ab3698b8e10ab0b95eff73ec8156b613fa0c6db72c3298e7ef97961fafd3d956265ae784a2b8444df663bb42533d4bcc8619901dc6c4dc7699176e9811b82987cb7e5e8e6b7cf3c7b7a70ca6af7bf507ffac7c3411da088c89f6f2ab330af56c1e5154970fb9a577ff5a7a104c88f3ebcc1f62d822f3188a928e2c3333f69183eca1f75d96afa1f21994332a16db7e3c50e5acdfa8b26037882717abca3c182aed8d278ba06471aac5009b2573031f7e8c0827cb4e438f7337474c149c6cdaebeff837127b8c19088362e6e7edc616b9ffa6f4e7593378ff2642f47aaf3f0f649bc49dfffd9ab4f5f893650048cdfaddc63e5d58ca28795bef0b251e6616305869075aeb7e1c2ae6555e32b4ec7322ff6b3a55caf5037d6fd71c391e2ed96f9976f34481f4643123f70dfd329b3e1b1026f1707944bae20ef82ddd59f623088bfe37ed2cf40c0feedd9c2a938f2ba58dde1159fe692b720883cc1a6b8c7cc001ff05176dbf58885561e268112de6b00bd18cfd4bc5
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ff:d9:8a:9a:bd:17:66:fa:d0:92:84:49:6e:75:71:7f:f1:a3:91:77]
            modulus: b36609fb7481d560e68e15d1e8fb3b855188f88ed75125ddcdf48da88d6277d610d6128d608c942cf5efbcfd07dfa53626ead7e036531bab7269448fc9eb5adf2474f2efeedd09e4adc54e25763553ede50876051d65c94ba3efd21695b66c83d5923611b5b2d43d7a9f86456c60953b6fb7093028b479374c3ee56f85b8f5d31ae8a373b4303f60b7aac552acfdb62f253434f8127cf5a3c045e9d5f515686065880bd436d9cab39a5de8b591619ddcac223adea95f2a8acfa46c0de7678308b901f97f9039bfe248d3459430269dd585d4369ba8da36256bfc1991cf351dbe3618e164475f174bdac19b4fd65ecc6448637f00b59f9479a14bf7adeb2d44f5
    public exponent: 10001

] 
2022-06-09 13:09:29.242  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-09 13:09:29.244 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-09 13:09:29.247 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-09 13:09:29.248 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-09 13:09:29.248  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-09 13:09:29.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-09 13:09:29.250  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-09 13:09:29.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-09 13:09:29.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-09 13:09:29.251 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-09 13:09:29.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-09 13:09:29.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:09:29.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-09 13:09:29.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:09:29.391  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-09 13:09:29.392  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-09 13:09:29.392 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-09 13:09:29.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-09 13:09:29.394  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-09 13:09:29.395  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-09 13:09:29.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:29.395 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:29.396 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:29.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:29.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:29.397 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:29.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-09 13:09:29.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-09 13:09:29.398 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-09 13:09:29.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-09 13:09:29.405 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 612685541863433803057860594488035219171357112787
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 09 11:10:27 UTC 2022
           Final Date: Tue Jun 08 11:10:26 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [e8:cf:6a:e5:92:0d:68:c1:7d:04:92:e0:4f:b7:47:20:f8:6c:52:0b]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: afae0e6741ac52e765f8e73c69b5d614f88d20e2
                       ca14233c2371f983a5b52e06009a83644c695671
                       c5ce1f7481d2902cab83b10761ff995426ae2882
                       01419e930f7b3d1d7d0a67447fdf265188f52932
                       ca3cdfaa3f8499d48048b77939b7dba99ffaac1f
                       4b7bfb1de91fd1d86a6569438bfd657eb46bed48
                       6da3f4e0c91d1d950a2e482dd712078d0cfd41f2
                       affae37da552fa78e9d96e2d1ab3c7ad23e8b0a1
                       75ab302661d7e7376ef26aa81c0dec1e545f8a48
                       aaf8724b3031ca55eb34e558456078ef8a8e8b19
                       138280822491dca3074603293802b59cb455424a
                       a41b40ef6bfe2aa862f709a36c197f411f90ce9c
                       a02be3c256ecd98499c2d00b135d8bfdad3666a1
                       484801e71b71a09d5e854c0d35fd7791da68e6ee
                       89f95367e035a7938ee337a2e1f4f6f3e124864a
                       3b79a558e30a08789c0a44a15f9cca6a8904dafe
                       1035e8faddd77c0bc6ba04d79998ed4fdb82720a
                       0770bfd92e84ccf63cd3a2a9a01eb28777a69798
                       a29149d6838186105050043c8191ace2352a70cd
                       2822556f
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [26:50:45:a4:df:21:58:ba:53:55:50:90:e2:66:07:6d:1d:f6:93:bc]
            modulus: c01d9857e0883758e92e2418143120dc6d95bcfd9fd2f7dec826c0843396d58143e0618f41ffe9d7f4b469cf926f4f1eec627822afcb2c00eab9347a8d9056594da341767f0ee9b7853bac48d24eddffe57553dec297199ea8b7e1aea558b795c0176cf0678907ff344681a48c65731ddf34fadc9fe2c195cc2802b308eebc797c3f70b19e28dcc84444ef68a0679bbb77c61bdf7030f1e85540c2b5a82ce6c03ee6619c8019e1ffa391643794e3fd7247c7820b0c04062d30a8214f19b2f2b5bec5bbd5d713b1b956d8401e80df3082d4b77f6631ee340ba16708d85b892c7749e079ac26fff17f09ab3404334ab123792925d16ba608158f85580929f216c1
    public exponent: 10001

]