Results

By type

          2022-06-25 03:15:44,884 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-25 03:15:45,705 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-25 03:15:46.399  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 25, 2022 3:15:48 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 25, 2022 3:15:48 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 25, 2022 3:15:48 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 25, 2022 3:15:48 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-25 03:15:48.968 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-25 03:15:49.338  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-25 03:15:49.502  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-25 03:15:50.342 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-25 03:15:50.349 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
2022-06-25 03:15:50.351 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-25 03:15:50.355 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-25 03:15:50.393 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-25 03:15:50.396 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
	{GET [/docs]}: redirectToUi(HttpServletRequest)
2022-06-25 03:15:50.534 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-25 03:15:51.271 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 25, 2022 3:15:51 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-25 03:15:52.228  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.165 seconds (JVM running for 10.053)
Jun 25, 2022 3:16:15 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-25 03:16:37.587  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 03:16:37.603 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 03:16:37.641 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-25 03:16:37.654 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 03:16:37.677  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-25 03:16:37.680  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 03:16:37.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 03:16:37.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 03:16:37.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 03:16:37.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 03:16:37.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 03:16:37.697 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 03:16:37.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 03:16:37.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 03:16:37.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 03:16:37.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 03:16:38.314  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 03:16:38.317  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 03:16:38.318 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 03:16:38.319 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 03:16:38.328  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 03:16:38.329  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 03:16:38.330 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 03:16:38.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 03:16:38.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 03:16:38.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 03:16:38.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 03:16:38.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 03:16:38.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 03:16:38.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 03:16:38.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 03:16:38.356 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 03:16:38.388 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [81:5a:c7:23:cd:b1:63:e1:51:6b:e8:d5:2c:b2:c1:33:ab:e5:f6:a3]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:36:28.092  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:36:28.095 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:36:28.108 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:36:28.109 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:36:28.110  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:36:28.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:36:28.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:36:28.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:36:28.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:36:28.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:36:28.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:36:28.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:36:28.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:36:28.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:36:28.322  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:36:28.323  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:36:28.324 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:36:28.325 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:36:28.341  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:36:28.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:36:28.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:36:28.349 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:36:28.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:36:28.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:36:28.352 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:36:28.353 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:36:28.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:36:28.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:36:28.354 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:36:28.356 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:36:28.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [17:a5:d9:37:4f:48:28:c7:d6:9f:63:ea:03:01:df:94:36:49:7b:14]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:38:16.248  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:38:16.250 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:38:16.252 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-25 04:38:16.253 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:38:16.254  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-25 04:38:16.256  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:38:16.257  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:38:16.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:38:16.258 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:38:16.259 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:38:16.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:38:16.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:38:16.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:38:16.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:38:16.438  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:38:16.439  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:38:16.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:38:16.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:38:16.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:38:16.442  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:38:16.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:38:16.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:38:16.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:38:16.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:38:16.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:38:16.445 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:38:16.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:38:16.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:38:16.446 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:38:16.447 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:38:16.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [56:bb:3a:cd:64:f5:12:06:b0:82:51:c9:b3:f1:d7:81:a3:a2:ca:e1]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:39:27.784  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:39:27.786 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:39:27.788 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-25 04:39:27.789 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:39:27.789  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-25 04:39:27.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:39:27.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:39:27.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:39:27.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:39:27.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:39:27.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:39:27.797 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:39:27.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:39:27.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:39:27.977  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:39:27.981  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:39:27.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:39:27.982 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:39:27.989  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:39:27.990  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:39:27.991 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:39:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:39:27.992 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:39:27.994 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:39:27.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:39:27.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:39:27.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:39:27.997 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:39:27.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:39:27.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:39:28.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0a:9b:70:59:de:f9:f2:5c:38:1a:a1:d2:d2:0c:3e:6b:a1:17:3b:3b]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:41:43.061  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:41:43.063 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:41:43.065 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:41:43.065 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:41:43.066  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:41:43.067  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:41:43.067  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:41:43.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:41:43.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:41:43.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:41:43.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:41:43.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:41:43.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:41:43.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:41:43.249  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:41:43.250  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:41:43.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:41:43.250 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:41:43.252  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:41:43.253  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:41:43.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:41:43.253 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:41:43.254 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:41:43.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:41:43.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:41:43.255 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:41:43.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:41:43.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:41:43.256 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:41:43.257 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:41:43.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ea:b6:f1:17:1a:a2:c8:75:9d:b6:9b:f6:82:fb:04:aa:05:d2:c9:9b]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:45:11.417  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:45:11.423 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:45:11.427 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:45:11.428 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:45:11.429  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:45:11.430  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:45:11.430  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:45:11.430 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:45:11.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:45:11.431 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:45:11.440 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:45:11.441 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:45:11.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:45:11.442 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:45:11.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:45:11.627  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:45:11.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:45:11.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:45:11.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:45:11.629  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:45:11.629 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:45:11.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:45:11.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:45:11.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:45:11.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:45:11.631 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:45:11.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:45:11.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:45:11.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:45:11.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:45:11.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [0c:91:31:b9:1b:0d:29:52:b0:3a:fd:9f:c4:5c:a2:5c:35:d4:6a:31]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:50:27.034  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:50:27.035 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:50:27.037 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:50:27.038 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:50:27.038  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:50:27.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:50:27.039  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:50:27.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:50:27.040 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:50:27.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:50:27.048 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:50:27.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:50:27.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:50:27.049 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:50:27.171  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:50:27.172  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:50:27.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:50:27.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:50:27.174  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:50:27.175  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:50:27.175 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:50:27.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:50:27.176 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:50:27.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:50:27.178 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:50:27.179 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:50:27.184 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:50:27.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:50:27.185 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:50:27.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:50:27.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [bd:8e:20:22:a8:d4:a0:90:03:ac:10:a5:45:00:8a:7d:d2:5f:e2:ad]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:54:15.579  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:54:15.581 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:54:15.583 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-25 04:54:15.584 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:54:15.585  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-25 04:54:15.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:54:15.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:54:15.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:54:15.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:54:15.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:54:15.595 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:54:15.596 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:54:15.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:54:15.597 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:54:15.771  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:54:15.772  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:54:15.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:54:15.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:54:15.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:54:15.775  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:54:15.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:15.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:15.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:15.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:15.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:15.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:15.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:15.779 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:15.780 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:15.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:54:15.787 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [86:db:4e:9d:d0:ee:7c:74:d3:22:91:2e:5b:31:69:49:37:7f:a6:50]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:54:33.103  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:54:33.105 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:54:33.108 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:54:33.109 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:54:33.110  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-25 04:54:33.110  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:54:33.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:54:33.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:54:33.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:54:33.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:54:33.118 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:54:33.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:54:33.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:54:33.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:54:33.250  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:54:33.251  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:54:33.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:54:33.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:54:33.254  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:54:33.254  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:54:33.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:33.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:33.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:33.257 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:33.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:33.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:33.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:54:33.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:54:33.260 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:54:33.261 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:54:33.273 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 97fc384ac535b22b637c3a5d8c11a2634cf483538fbe13cf8a02ae6e3a92c4393c9009a2bae914161c84518633b3b63ae7b9090844c78a956cee7b5ffc84664118ca59b4aba2690fd1b3745d9081218e94a23141b72b642e475624f8edae40a16342e1eec59351f37f48d81f4011eeed416a3587f505a1bd45fa7e475b416062f44fb11c62d9065d8574ccc999051d1c1fbee00d4198f11fa54940649ef39e22b967899f4d358102892ab75b8728d38a2922e64292a6ca06fb7255e2d5de71c40ea2a53d65cdce83f7c4a40eb15dd0b41b16dfc02cb69d289e7ec6d9651c9a5bcfcc2db8ceb5f54623007e8de2ada61dafb37ad2b6654f9bb1e037d7c2d82bbd6a3ac9f61af7204bb97c0b220aba19156a4b2968b10b132b0c6a6e30127ed1aea82c7dd3c278567dacb5b0d76c7c7de241060557161ff5c76e3c2b8a50569f18e36bd6bd9301b43a610a41681f6c01e6e4d37b16e0b5cad2646e19575892b8d6bc022c6c2b9549e6eb2a199e3c86f274ee474a52648eb6d0fa0532b6c9b8a0ed
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7f:cf:e3:61:36:bf:ac:e1:05:10:5d:66:e7:3f:43:51:07:9f:29:f2]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:59:34.667  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:59:34.669 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:59:34.672 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-25 04:59:34.673 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:59:34.674  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-25 04:59:34.675  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:59:34.675  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:59:34.675 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:59:34.676 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:59:34.677 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:59:34.684 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:59:34.685 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:59:34.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:59:34.686 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:59:34.898  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:59:34.899  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:59:34.899 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:59:34.900 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:59:34.902  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:59:34.903  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:59:34.903 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:34.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:34.904 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:34.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:34.905 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:34.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:34.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:34.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:34.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:34.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:59:34.911 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [94:b0:3f:75:e5:08:4e:d6:16:38:1d:ca:09:37:a5:a9:25:10:24:51]
            modulus: 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
    public exponent: 10001

] 
2022-06-25 04:59:51.598  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-25 04:59:51.600 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-25 04:59:51.602 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-25 04:59:51.603 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-25 04:59:51.603  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-25 04:59:51.604  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-25 04:59:51.604  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-25 04:59:51.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-25 04:59:51.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-25 04:59:51.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-25 04:59:51.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-25 04:59:51.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:59:51.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-25 04:59:51.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:59:51.797  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-25 04:59:51.798  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-25 04:59:51.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-25 04:59:51.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-25 04:59:51.800  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-25 04:59:51.801  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-25 04:59:51.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:51.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:51.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:51.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:51.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:51.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:51.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-25 04:59:51.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-25 04:59:51.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-25 04:59:51.806 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-25 04:59:51.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 268127546254022274628566860822946442771072972172
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jun 25 03:13:28 UTC 2022
           Final Date: Thu Jun 24 03:13:27 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [79:39:f0:3b:e8:5c:65:64:5c:90:32:2d:cd:1b:00:24:69:b1:c1:18]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 8200279f013765c44a81ddfa4080bbac5c1eda77
                       413f1c8f0146cf45c3349b18462cc95a38934f98
                       ff678183f782034a1bfada683a37b5cd543e2b8c
                       961dfcc46ea071cc8ac7aef1660c243845f3e24d
                       ab1400cfce53a967ae83ad279b926a127e49809a
                       397d86d7905b19270698e4b2def7717b8f2c9347
                       06148f62c1633ac30af957fe63c6688dbd48722e
                       f5ae88d8f09cfbda71263c60da21303a36003898
                       d31beb2a920892516d1047dca1c53df2d4e344a8
                       d55c183e8e7162ecb4b46d0eba9497004e19b4a3
                       3e3d6915a99243f6d1dc464f61eb1bb539ac9814
                       65f7e577c436a733d57c6332e8e572cf61f15224
                       8bfdefc085fa079b205a46824f4979b30c13ec25
                       eb0c402c9c4728a9400833b40123d8615043b936
                       aa6bf3d80d7207dcf693c0862d0666ac0cad0136
                       1da5751493d17ed2af993dc54786143d1cd8e53c
                       2a059119f35ed052be04ebc897f3f8736d0c7470
                       519ef016f30175fb049ba7e2cf65b382e9291ef3
                       637ca89f38c064aa47b6420769de4eb983f63b71
                       82f63b34
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [eb:c1:59:5c:00:46:8f:ec:8d:71:bb:0a:ce:e6:85:26:50:27:5e:87]
            modulus: 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
    public exponent: 10001

]