Results

By type

          2022-07-02 03:26:19,488 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-02 03:26:20,453 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-02 03:26:21.196  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 02, 2022 3:26:23 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 02, 2022 3:26:23 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 02, 2022 3:26:23 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 02, 2022 3:26:23 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-02 03:26:23.877 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-02 03:26:24.180  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-02 03:26:24.344  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-02 03:26:25.012 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-02 03:26:25.014 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-07-02 03:26:25.016 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-02 03:26:25.020 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-02 03:26:25.060 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-02 03:26:25.063 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-07-02 03:26:25.181 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-02 03:26:25.779 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 02, 2022 3:26:26 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-02 03:26:26.668  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 7.962 seconds (JVM running for 9.648)
Jul 02, 2022 3:26:47 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-02 03:26:57.104  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 03:26:57.112 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 03:26:57.152 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-02 03:26:57.161 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 03:26:57.179  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-02 03:26:57.183  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 03:26:57.185  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 03:26:57.187 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 03:26:57.188 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 03:26:57.193 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 03:26:57.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 03:26:57.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 03:26:57.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 03:26:57.268 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 03:26:57.269 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 03:26:57.274 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 03:26:58.039  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 03:26:58.042  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 03:26:58.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 03:26:58.044 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 03:26:58.053  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 03:26:58.054  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 03:26:58.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 03:26:58.056 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 03:26:58.057 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 03:26:58.068 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 03:26:58.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 03:26:58.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 03:26:58.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 03:26:58.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 03:26:58.076 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 03:26:58.078 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 03:26:58.107 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [7e:f2:24:f0:ff:6e:4a:31:82:9f:bc:c1:2a:b8:74:cd:6e:52:f5:13]
            modulus: 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
    public exponent: 10001

] 
2022-07-02 04:51:27.642  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 04:51:27.648 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 04:51:27.653 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-02 04:51:27.659 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 04:51:27.661  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-02 04:51:27.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 04:51:27.663  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 04:51:27.664 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 04:51:27.665 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 04:51:27.666 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 04:51:27.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 04:51:27.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:51:27.678 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:51:27.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:51:27.958  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 04:51:27.962  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 04:51:27.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 04:51:27.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:51:27.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 04:51:27.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 04:51:27.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:51:27.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:51:27.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:51:27.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:51:27.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:51:27.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:51:27.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:51:27.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:51:27.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:51:27.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 04:51:27.983 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [3b:3c:ab:14:1e:ce:e4:c7:46:c4:8a:3e:00:f8:61:34:a8:18:36:68]
            modulus: f1ff34ca05f8348c8287910735c9d38089eccb893c3637abcbd48de3ecb755563c709f9bd35cf01483e087312ba722e75ff65b93cf528719157d909660c5c32a031f58ab629ba0f8ae2d1e2dbb5553e394b73089c9226a71e7a57f88c7a5b7d040304a74ce21afe01fd032966cbfcc07f93331f23293b65ac431ac59277b0ca8d542146fbe405f4ef41f6c40cdd3c211949f2f0b9ac8ffdd5d2e06b5472ffe3575572c84abb6c0619e8636eae3b700aa27d85c0b0ca2df6229a95aba7300f65e31496b4afce196c48b0ab562e9c0ca616801be7135aca91a7c6e6a11578f7e26242c2a6da28e4bac83599d18de27f62e4f60180a05f1da53a4f4fa2a233910af
    public exponent: 10001

] 
2022-07-02 04:53:07.602  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 04:53:07.604 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 04:53:07.606 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-02 04:53:07.606 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 04:53:07.607  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-02 04:53:07.608  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 04:53:07.608  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 04:53:07.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 04:53:07.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 04:53:07.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 04:53:07.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 04:53:07.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:53:07.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:53:07.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:53:07.905  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 04:53:07.906  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 04:53:07.906 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 04:53:07.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:53:07.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 04:53:07.909  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 04:53:07.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:53:07.910 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:53:07.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:53:07.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:53:07.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:53:07.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:53:07.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:53:07.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:53:07.914 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:53:07.915 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 04:53:07.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [78:00:e1:1e:d0:e5:62:d2:4d:0c:99:f6:88:c6:15:e1:47:e7:41:37]
            modulus: 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
    public exponent: 10001

] 
2022-07-02 04:54:27.129  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 04:54:27.130 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 04:54:27.132 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-02 04:54:27.133 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 04:54:27.133  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-02 04:54:27.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 04:54:27.135  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 04:54:27.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 04:54:27.136 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 04:54:27.137 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 04:54:27.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 04:54:27.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:54:27.151 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:54:27.152 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:54:27.380  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 04:54:27.382  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 04:54:27.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 04:54:27.382 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:54:27.384  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 04:54:27.385  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 04:54:27.385 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:54:27.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:54:27.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:54:27.386 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:54:27.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:54:27.387 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:54:27.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:54:27.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:54:27.388 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:54:27.389 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 04:54:27.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: ca153a29f73a21637c6fd83d10f8ecb764274430c7a9aaffde939432059479657e080235624e5c18714eb4138dec763d85a5323e07a85001d9ba04772941157fcdb51f374e2c7e61dee5c516819137d47f31265fffab923d5bbbd2a87d83761a77413a81636745ef4df667be91e6789a44e9a57a2f596763acbc9d158f7cbff50e80f8701d07835a676655154e1bb5ff3ead31e73c77740f2249e18bde3b587e3bb2ce9c7ca8ea12ae38b12be625f90575932a7a1ad54b015d44eb9ecd5b53f69a931460dee1561d0fb5a3b4c75152c046ef177375e9510f27ff8494ab1adfd6f0864adfd12ed4ece2d89b5c592b42b2ac72916edb0058f6409e3fb6dee14e822d932bbc0eba21a85203807efe40b85faccaab3eb3ed8c704b20338236857b96f923fddba93bb67cb275ea6e80b0478fa1b77f902c593287520c61e180592be605fd11b33030ba975ca60c25bc1d6e2fe99097230556ff7762656d6ec684b397ef69b178e61120d97ae02a2765b2e47c36b8e5e9a4e6cbe7d897d00b97a13405
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d7:f1:5d:c7:52:e9:a4:03:c2:4b:ec:17:34:45:b5:c0:63:8f:96:3b]
            modulus: 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
    public exponent: 10001

] 
2022-07-02 04:56:32.222  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 04:56:32.223 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 04:56:32.225 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-02 04:56:32.226 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 04:56:32.226  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-02 04:56:32.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 04:56:32.228  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 04:56:32.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 04:56:32.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 04:56:32.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 04:56:32.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 04:56:32.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:56:32.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 04:56:32.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:56:32.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 04:56:32.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 04:56:32.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 04:56:32.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 04:56:32.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 04:56:32.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 04:56:32.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:56:32.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:56:32.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:56:32.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:56:32.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:56:32.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:56:32.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 04:56:32.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 04:56:32.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 04:56:32.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 04:56:32.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:32:a2:d5:cc:7c:f0:df:18:53:29:bf:69:12:bb:12:58:a5:ec:01]
            modulus: c5833c847e99aa6bd99d664795a7cfef0dc33798ab7e500474e4719527a00f6679d0e33f91e4a2af7cc1cc6a6a9ff01bf0e8ea44bbebf9780e12eccf422fc02ce7eaf35d3d09d59b3b4e98a129caa76e386fc044903a8326b933230e2ed8f5f94575f415708e82e454d08175231a99c49b028e56fe5f8ed9c7295ac55ce0197b6308458aff4102dd76a8b37bc2c3caad7078b9f293953d44b3c79b069c56277a2eccf2441ee66f58b5cbc9b153f6c6d83d823ae03518f366dce4e43fb7d26a7c3cb2d76c6f59ebb7cf6d540946f7bf489135c1bf5ce1e7805913c95f0dcdd3228bffe3d5ac423e91a362fbae25f84fe486b1b8d00370ca1fcd7f08910640c429
    public exponent: 10001

] 
2022-07-02 05:05:21.780  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 05:05:21.785 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 05:05:21.788 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-02 05:05:21.789 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 05:05:21.790  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-02 05:05:21.793  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 05:05:21.794  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 05:05:21.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 05:05:21.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 05:05:21.796 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 05:05:21.803 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 05:05:21.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:05:21.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:05:21.804 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:05:22.048  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 05:05:22.049  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 05:05:22.049 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 05:05:22.049 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:05:22.051  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 05:05:22.052  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 05:05:22.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:05:22.052 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:05:22.053 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:05:22.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:05:22.054 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:05:22.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:05:22.055 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:05:22.056 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:05:22.056 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:05:22.057 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 05:05:22.061 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [d4:f8:f7:9c:95:1a:a2:74:71:4b:10:15:8a:85:20:0a:3b:73:f6:a2]
            modulus: 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
    public exponent: 10001

] 
2022-07-02 05:09:50.557  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 05:09:50.559 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 05:09:50.562 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-02 05:09:50.563 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 05:09:50.563  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-02 05:09:50.564  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 05:09:50.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 05:09:50.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 05:09:50.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 05:09:50.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 05:09:50.571 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 05:09:50.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:09:50.572 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:09:50.573 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:09:50.879  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 05:09:50.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 05:09:50.880 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 05:09:50.881 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:09:50.882  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 05:09:50.883  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 05:09:50.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:09:50.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:09:50.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:09:50.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:09:50.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:09:50.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:09:50.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:09:50.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:09:50.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:09:50.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 05:09:50.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ce:7e:b7:51:ee:e7:a7:58:61:0a:b0:1a:ce:39:4d:ac:f0:6f:fb:00]
            modulus: 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
    public exponent: 10001

] 
2022-07-02 05:10:07.194  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-02 05:10:07.195 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-02 05:10:07.196 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-02 05:10:07.197 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-02 05:10:07.197  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-02 05:10:07.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-02 05:10:07.198  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-02 05:10:07.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-02 05:10:07.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-02 05:10:07.199 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-02 05:10:07.204 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-02 05:10:07.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:10:07.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-02 05:10:07.205 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:10:07.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-02 05:10:07.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-02 05:10:07.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-02 05:10:07.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-02 05:10:07.388  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-02 05:10:07.389  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-02 05:10:07.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:10:07.389 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:10:07.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:10:07.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:10:07.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:10:07.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:10:07.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-02 05:10:07.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-02 05:10:07.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-02 05:10:07.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-02 05:10:07.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 207101148207557877736745917837895370757712620707
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sat Jul 02 03:22:59 UTC 2022
           Final Date: Thu Jul 01 03:22:58 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [d5:0b:a7:74:a9:72:81:59:e0:0c:7d:fb:d4:bf:2d:c3:3f:98:bf:22]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: 35e9a19fbbb8528bf8871146801d2b76158b3a0b
                       a6275612f5bce7f2f7a99719ad43e963eb409bcf
                       b96aae66ab213842fd2cde06308649ee31e9a576
                       f45cf82c9ceecfd9cf8509d6c0510739ace28ec7
                       5af18b0483dcf0bc764fc428cc3b2c8b266ce559
                       37ae845f552dddc8c68ccb5feba92050f655bda7
                       bb3f8b6a0503be35961bfb44210fea3e6c0ddd2c
                       6334ba0bc019b404acacb882f2f26bc43d9ee853
                       066bb1305e02f284fb8ab7d9884163fa85fadb99
                       d38dcf6ce7a57713a1a15a5f7d17a04473c12bb5
                       3146349417262eff5ceaf471c61e792e5a01fad9
                       bd7d86f53a88759ac76c309f17a68b43564eb44a
                       c03a8fd47b1e55c795c5c097f02373c29557ebbb
                       00dd8130584f5f32d920319398789742962c2432
                       a6e2e5591343c6b8efcc06b7e863af443d8d65a7
                       02e5e8cd0d52cca133c8c2dec10e0622afa06300
                       f6ff50c3c3c1943fe2514fa4633004c4db4793cc
                       fa6062417ddd02f0adb98f18e8572aed66a850f8
                       0d89128e1a835297e7f71f3a7a572ddc19c172ae
                       eb194101
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [b0:66:d4:f0:22:75:a0:6d:06:e6:51:ee:d2:b2:5f:96:fe:c6:a4:d2]
            modulus: b8555395b7720e4f9da396a427e2f939f1b2501c5020991f8904eed039203d20a3964a9c8e78b7bffb1988de0579b712b38b7eb5f6d46507c5165c183b5220590dbcdb7273bb6ab1cba0a98179092384965659a596f0a3d1469346f6a2f7b8ddafe1cbeb767e56c04aff97078df51d8dd898f37aba986289935a978c42f6c6bc8dbcb78683e6e9d6f8575d377300f75b9fc0a208943725d4b99fa81ca1104ddf11d9fee5f9a526e055bf5d98cbb7807dc7b6f8eb837dbdfa60a7fe38d6fae7dd456a384814b91e25c69601c8e515c8c1978949f4f160394f37cef48507fcf1a3190e23e0dca01578f46649c513713a9ad977664b26385aad340146d1150dc0f1
    public exponent: 10001

]