Results

By type

          2022-06-30 03:27:57,525 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-06-30 03:27:58,425 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-06-30 03:27:59.091  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jun 30, 2022 3:28:00 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jun 30, 2022 3:28:00 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 30, 2022 3:28:00 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jun 30, 2022 3:28:01 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-06-30 03:28:01.514 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-06-30 03:28:01.787  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-06-30 03:28:01.937  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-06-30 03:28:02.561 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-06-30 03:28:02.564 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-06-30 03:28:02.565 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-06-30 03:28:02.569 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-06-30 03:28:02.608 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-06-30 03:28:02.611 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-06-30 03:28:02.729 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-06-30 03:28:03.305 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jun 30, 2022 3:28:03 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-06-30 03:28:04.096  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.313 seconds (JVM running for 9.092)
Jun 30, 2022 3:28:30 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-06-30 03:28:56.996  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 03:28:57.005 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 03:28:57.037 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-30 03:28:57.041 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 03:28:57.056  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-06-30 03:28:57.059  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 03:28:57.060  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 03:28:57.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 03:28:57.061 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 03:28:57.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 03:28:57.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 03:28:57.073 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 03:28:57.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 03:28:57.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 03:28:57.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 03:28:57.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 03:28:57.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 03:28:57.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 03:28:57.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 03:28:57.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 03:28:57.805  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 03:28:57.806  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 03:28:57.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 03:28:57.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 03:28:57.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 03:28:57.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 03:28:57.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 03:28:57.818 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 03:28:57.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 03:28:57.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 03:28:57.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 03:28:57.826 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 03:28:57.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [2b:6b:20:a7:a0:da:fd:23:09:86:a0:63:e3:e6:0e:56:b3:2a:6f:cb]
            modulus: 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
    public exponent: 10001

] 
2022-06-30 04:49:40.796  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 04:49:40.800 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 04:49:40.804 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-30 04:49:40.805 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 04:49:40.806  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-30 04:49:40.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 04:49:40.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 04:49:40.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 04:49:40.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 04:49:40.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 04:49:40.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 04:49:40.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:49:40.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:49:40.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:49:41.087  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 04:49:41.088  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 04:49:41.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 04:49:41.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:49:41.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 04:49:41.092  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 04:49:41.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:49:41.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:49:41.094 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:49:41.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:49:41.095 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:49:41.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:49:41.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:49:41.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:49:41.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:49:41.099 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 04:49:41.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [5c:37:52:88:93:d8:dd:a8:df:69:6a:c7:5c:e9:fc:3d:49:e3:f6:2c]
            modulus: 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
    public exponent: 10001

] 
2022-06-30 04:51:28.392  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 04:51:28.394 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 04:51:28.396 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-30 04:51:28.397 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 04:51:28.398  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-06-30 04:51:28.400  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 04:51:28.401  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 04:51:28.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 04:51:28.401 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 04:51:28.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 04:51:28.410 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 04:51:28.411 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:51:28.411 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:51:28.412 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:51:28.631  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 04:51:28.632  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 04:51:28.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 04:51:28.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:51:28.635  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 04:51:28.636  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 04:51:28.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:51:28.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:51:28.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:51:28.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:51:28.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:51:28.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:51:28.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:51:28.639 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:51:28.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:51:28.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 04:51:28.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [67:5c:21:52:43:5f:cb:3e:cc:06:64:18:66:a7:9b:ef:02:eb:33:83]
            modulus: a7302042e24ce335529df04b2d0b420acb7c561831fb89e747395e7ae5bc3dc19b02373b1a79b0db711c71cd7c0c21bb61dadc1c779229cba41c02d913d8d3418aff5873dc7e14656d9e0fd1177ef38d6e1077a5c1fb5da926ec0faf6a21bb79fad12bd1d19b19120763174d7ed97df127e7fbca8e5a5bf8d306141b710dc2ca97d58c256118c464ca6d0e9fbee09881a203c8bafe1f8bc2a5ceb7a7259a4f4bf2234b804137afbd87c74b672684647e744dbad81cedecf10154e0f3427acd644cba470533ec9e50d76428a61bc1ae64022b39bbbe4c1888cce39d724a6725b242773415aa1c41367e33fec3dd3782321a38e2a948fbd5f921d13fd594904179
    public exponent: 10001

] 
2022-06-30 04:52:48.328  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 04:52:48.329 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 04:52:48.330 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-30 04:52:48.331 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 04:52:48.332  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-06-30 04:52:48.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 04:52:48.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 04:52:48.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 04:52:48.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 04:52:48.334 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 04:52:48.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 04:52:48.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:52:48.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:52:48.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:52:48.519  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 04:52:48.520  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 04:52:48.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 04:52:48.521 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:52:48.523  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 04:52:48.524  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 04:52:48.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:52:48.525 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:52:48.526 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:52:48.527 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:52:48.527 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:52:48.528 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:52:48.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:52:48.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:52:48.529 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:52:48.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 04:52:48.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [c1:f3:c9:7d:96:36:d4:94:20:e9:9b:20:6b:57:91:90:c8:9b:5e:b3]
            modulus: f0e4917aad87a94039874020eac871e527e75dee586825312a8697d2a7a0fd27857b9092bfb3f3a7028d5b4fd7abdc66caa271a5bdfe2ae973a7750edf6532b7e8fd54c3c150818cfa4a827db9092bed11db4014da5a443ac4e55eb2040ff51139f49dfe071c8e8a7582f172f1003e698b8414a0c6e812ae229d4881f241b3539028cc85a03ea3ccf1b2258c53b6c812d212e1cde6858f45a376afd046969d409bf918ad830cb473a2cb886cb3f90861c8ae28bfa585f3673738da1414fef35b752846fda32689c829fea458fefbd69d196d23106d8ea96a260cd8ec60f6f7e223f53276303a8ced630b44b390bb9d8049006e998c795a6d6fe1fc0ff117d375
    public exponent: 10001

] 
2022-06-30 04:54:31.486  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 04:54:31.487 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 04:54:31.488 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-30 04:54:31.489 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 04:54:31.489  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-06-30 04:54:31.490  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 04:54:31.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 04:54:31.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 04:54:31.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 04:54:31.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 04:54:31.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 04:54:31.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:54:31.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 04:54:31.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:54:31.668  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 04:54:31.669  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 04:54:31.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 04:54:31.669 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 04:54:31.671  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 04:54:31.672  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 04:54:31.672 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:54:31.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:54:31.673 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:54:31.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:54:31.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:54:31.674 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:54:31.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 04:54:31.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 04:54:31.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 04:54:31.677 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 04:54:31.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:9f:bd:cd:e0:41:60:9d:75:a6:6a:08:fa:da:88:61:e1:88:b9:30]
            modulus: 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
    public exponent: 10001

] 
2022-06-30 05:05:13.574  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 05:05:13.577 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 05:05:13.579 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-30 05:05:13.580 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 05:05:13.580  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-06-30 05:05:13.581  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 05:05:13.582  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 05:05:13.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 05:05:13.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 05:05:13.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 05:05:13.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 05:05:13.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:05:13.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:05:13.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:05:13.919  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 05:05:13.920  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 05:05:13.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 05:05:13.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:05:13.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 05:05:13.922  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 05:05:13.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:05:13.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:05:13.923 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:05:13.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:05:13.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:05:13.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:05:13.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:05:13.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:05:13.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:05:13.927 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 05:05:13.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: b76d6b7ae41561938704168e1333c6cfe14574df2521b228ea556eec0d1e3def1394d7f782e1178378dc442c6a4866cecc2497925d9aa5a12ed1ac2897d29302d46ceb75e7debc0aa158b56557ba6ccbd841b00a7b199012e5ed482f27837c54791ff60de8d6fd55698d1913e76000a7b1c8fdbe673b33d0a41d42571f20af91255cb830eb44b91471806e9a1b978680ce99a72c850b50d68892b94a19ee8a624e5e1bd73170bfdddaf66c59028e125008393d9e594b0cf0152c1247b85589b218c4f33623004644b3004ad9d75552aa38d3f2fca4495a685f4ecd204f935786c61290ccbc55035b75e1e0a38d0c750f667bcae83f08ea187ae70cff45f1f96e4e7a3c6f22cb49ad12c230a6adda48732f91438bcaf57a096dab1eadb0a8709d7c5572b44e09dbcf69367feb1dce9f02f7861ad7c9b24f8d6ac36f5cbba2da47ba7e4bd152a4d5a55c8e56e1bae7cc77ec339bb9b9e376141f5b0495c99ad02ff2863cac484d157d3f62c8012edec336fd77fc1b8431b605846eda8a6dcdc875
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [9f:39:78:fa:5a:47:c2:60:3e:22:fe:bb:cb:8e:97:af:3e:ff:3b:82]
            modulus: c74e1a33ffceae83fb1a14f26612a5afca6aadf59af31c0805ba8150727e64f86d998e4c8fc87f1ef796e8a2a2111b0bf2060dde0a5ee112f51f92839f59fb1533663d536d05ab3c6ad97313cea0f3e5ff5b7cf8fd6f3ea9f61cd237909d1ce073f26ac066e30aa09ccc713468c7f40ff25219cef95cd9f8dbde173bda1792b814048875520f643482d1d97424c15e3047ea8e89c87f7417172e1ae6cb11f7c37636b943ce3e86e5fa48b022de01956fdd69b07709183aff88eacf4175fb7828e6aa6be4f36fdbdbb93f949b74388adf7760e2b51f2bdf6ceadf382a05e21ae80fdc119389c7112b5cd24dfd352c9bbc9be747732c8a9041b830fe8ef87e2ae9
    public exponent: 10001

] 
2022-06-30 05:10:01.173  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 05:10:01.174 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 05:10:01.175 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-30 05:10:01.176 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 05:10:01.176  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-06-30 05:10:01.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 05:10:01.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 05:10:01.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 05:10:01.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 05:10:01.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 05:10:01.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 05:10:01.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:10:01.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:10:01.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:10:01.482  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 05:10:01.483  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 05:10:01.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 05:10:01.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:10:01.485  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 05:10:01.486  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 05:10:01.486 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:01.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:01.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:01.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:01.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:01.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:01.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:01.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:01.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:01.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 05:10:01.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f5:04:d5:a9:43:a4:18:15:55:7e:21:10:f6:58:4c:06:00:74:1b:57]
            modulus: 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
    public exponent: 10001

] 
2022-06-30 05:10:18.037  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-06-30 05:10:18.038 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-06-30 05:10:18.040 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-30 05:10:18.040 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-06-30 05:10:18.041  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-06-30 05:10:18.041  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-06-30 05:10:18.042  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-06-30 05:10:18.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-06-30 05:10:18.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-06-30 05:10:18.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-06-30 05:10:18.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-06-30 05:10:18.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:10:18.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-06-30 05:10:18.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:10:18.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-06-30 05:10:18.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-06-30 05:10:18.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-06-30 05:10:18.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-06-30 05:10:18.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-06-30 05:10:18.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-06-30 05:10:18.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:18.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:18.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:18.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:18.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:18.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:18.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-06-30 05:10:18.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-06-30 05:10:18.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-06-30 05:10:18.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-06-30 05:10:18.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 426753972933155463142805008654425440406374151530
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Thu Jun 30 03:24:50 UTC 2022
           Final Date: Tue Jun 29 03:24:49 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [65:f8:82:7e:93:35:75:c3:eb:0e:3a:9b:22:aa:e0:3e:1d:fa:fb:c6]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 24157ad460c60aecadbf711b41bdf464b162544a
                       edc3c610ab4080c0821a808d1561f1ee1afd6ddc
                       766cf9cd1c08de879b78b11b02f5067d42b43fa4
                       d309842e4b75e92ae37dc36ce55e225f81c54481
                       2aace86ad53970af8aa024fd5522a1798d1996ca
                       e1f00e26b1edfea45a8ea3f2985e93ca9b555a54
                       6fab13b0d24ee84e1260309506ff2b61bec575ce
                       a6995b7efe42e369d7d38d29efca957137fc5070
                       27cc32609095bc60308713b166f168ded7a2897f
                       8eca4c998203835d49ad5c88713b00f06f5bc864
                       1f6e8710ed0efad64cd7d003e0d3d86dc9f2b2fa
                       ce44876c097657e5b8dc45a491da2d1f8d1f61e0
                       189d5cb887f3c85f9ac07b90949ae3e2bed8eb0a
                       206035e66084f7dc7a0539c4030b48a4ea43508b
                       fcdf6daf61530a704ce0886eb8eb739af9b60ce8
                       fdfef891d38a25eeb47839737cb777c11c8edbbf
                       d0290e35e2c4e8d4f7883782986cd77abb17edef
                       f4b1529b70f1b722667803c8bad4b66458a7e1b0
                       f54deb13e80247d2649c7c559ed16e984b1dea83
                       6fe62402
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [50:6f:e0:f3:1a:bf:af:d0:99:48:2f:8a:e6:7e:67:90:0d:1c:f8:82]
            modulus: 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
    public exponent: 10001

]